beautypg.com

H3C Technologies H3C Intelligent Management Center User Manual

Page 17

background image

xii

Deleting sensors ··················································································································································· 436

 

Managing virtual security domains ···························································································································· 437

 

Configuring AP categorization rules ················································································································· 437

 

Configuring attack detection policies ················································································································ 442

 

Configuring signature policies ··························································································································· 445

 

Configuring countermeasure policies ················································································································ 459

 

Configuring virtual security domains ················································································································· 462

 

WIPS dynamic detection information························································································································· 466

 

Detected channel list ··········································································································································· 466

 

Trusted address list ·············································································································································· 468

 

Alarm-ignored address list ·································································································································· 470

 

Blocked address list ············································································································································· 472

 

Countermeasures address list ····························································································································· 474

 

Detected APs ································································································································································· 476

 

Viewing the detected AP list ······························································································································· 478

 

Synchronizing detected APs ······························································································································· 479

 

Querying detected APs ······································································································································· 479

 

Modifying the category of an AP ······················································································································ 480

 

Assigning/removing an AP to/from a static list ······························································································ 481

 

Viewing the detected AP history ························································································································ 481

 

Querying the detected AP history ······················································································································ 482

 

Detected client list ························································································································································ 482

 

Viewing the detected client list ··························································································································· 482

 

Synchronizing detected clients ··························································································································· 483

 

Querying detected clients ··································································································································· 484

 

Viewing the detected client details ···················································································································· 484

 

Assigning/removing a detected client to/from a static list ············································································· 486

 

Viewing the detected client history ···················································································································· 486

 

Querying the detected client history ·················································································································· 486

 

Detected SSIDs ····························································································································································· 487

 

Viewing the detected SSID list ··························································································································· 487

 

Synchronizing detected SSIDs ··························································································································· 487

 

Querying detected SSIDs ···································································································································· 488

 

Viewing the detected SSID details ····················································································································· 488

 

Viewing the detected SSID history ····················································································································· 489

 

Querying the detected SSID history ·················································································································· 490

 

Security event ······························································································································································· 490

 

Viewing the WIPS security event list ················································································································· 490

 

Querying security events ···································································································································· 491

 

Deleting security events······································································································································· 491

 

25 Configuring automatic network planning

········································································································ 493 

Entering a location view topology ····························································································································· 493

 

Adding a background picture ···································································································································· 493

 

Setting a scale ······························································································································································ 494

 

Drawing obstacles ······················································································································································· 494

 

Adding an obstacle ············································································································································· 494

 

Modifying an obstacle ········································································································································ 495

 

Deleting an obstacle ··········································································································································· 495

 

Enabling automatic network planning ······················································································································· 496

 

Viewing the signal coverage of virtual APs ··············································································································· 497

 

Deploying virtual APs ·················································································································································· 497

 

Adding a virtual AP to the current location ······································································································ 497

 

Modifying a virtual AP ········································································································································ 497

 

Deleting a virtual AP ··········································································································································· 498