H3c-technologies H3C SecCenter Firewall Manager Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Bezpečnost H3c-technologies H3C SecCenter Firewall Manager. H3C Technologies H3C SecCenter Firewall Manager User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 131
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
H3C SecCenter Firewall Manager
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document version: 6PW106-20120420
Zobrazit stránku 0
1 2 3 4 5 6 ... 130 131

Shrnutí obsahu

Strany 1 - Configuration Guide

H3C SecCenter Firewall ManagerConfiguration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document version: 6PW

Strany 2

4 Figure 4 Uninstall the Firewall Manager 3. Restart the operating system. 4. Remove all files and subdirectories under the SecCenter installatio

Strany 3 - Preface

94 Table 94 Fields of the policy’s rule list Filed Description ID ID of the interzone rule. When you create an interzone rule, the system automatical

Strany 4 - Documentation feedback

95 Figure 94 Add interzone rules to the policy Return to Interzone policy management functions. Sorting interzone rules On an interzone policy’s ru

Strany 5 - Contents

96 Return to Fields of the policy’s rule list. Clearing interzone rules 1. From the navigation tree of the firewall management component, select App

Strany 6

97 Figure 98 Apply an interzone policy to devices Intrusion detection The intrusion detection module provides configuration of blacklist entries an

Strany 7 - Overview

98 Figure 99 Blacklist Table 95 Blacklist management functions Function Description Blacklist Allows you to view blacklist configuration of the vir

Strany 8

99 Field Description Hold Time Lifetime in minutes of the blacklist entry. Deployment Result Result of the deployment operation. Operation • Click

Strany 9

100 Item Description Virtual Device Group Required Select a virtual device group. A blacklist entry belongs to only one virtual device group. Return

Strany 10

101 The deployment result is shown on the blacklist as shown in Figure 99. To redeploy a blacklist entry that fails the deployment, select the entry,

Strany 11 - System management

102 Figure 103 Modify a blacklist entry Return to Blacklist management functions. Packet inspection The packet inspection function enables firewall

Strany 12

103 Function Description Copying a packet inspection profile Allows you to copy a packet inspection profile to generate a new one. Follow these step

Strany 13

5 System management The system management component of the Firewall Manager is mainly used to configure the firewall devices, the software, and the c

Strany 14 - Item Descri

104 2. Click Add to enter the page for adding a packet inspection profile, as shown in Figure 105. 3. Configure the settings. 4. Click OK. Figure

Strany 15

105 Figure 106 Deploy a packet inspection profile Return to Packet inspection management functions. CAUTION: You can deploy only one packet inspe

Strany 16 - Device software management

106 Table 100 Firewall management functions Function Description Firewall device list Allows you to view information about the current firewall devi

Strany 17

107 4. Select the check boxes before the devices that you want to add to the firewall management component, and click Add. The firewall device mana

Strany 18

108 pre-defined segments, and modify, copy, delete, export, or deploy the custom configuration segments. You can also import configuration files from

Strany 19 - Device config management

109 Configuration segment list The configuration segment list is on the configuration segment management page, as shown in Figure 110. Table 105 Fie

Strany 20

110 Figure 111 Add a configuration segment Table 106 Configuration items Item Description File Type Required Select the configuration segment type,

Strany 21

111 After the import operation completes successfully, a configuration segment by the name you specified will appear in the configuration segments li

Strany 22

112 Figure 113 Select the devices you want to deploy the configuration segment to 2. Configure parameters—Type the SNMP version and community stri

Strany 23

113 Figure 115 Configure deployment task attributes 4. Confirm your configuration. You can click the icon on the device list to view the config

Strany 24 - 6. Running Config

6 Table 1 Device management functions Function Description Device list Allows you to view details about devices, export configurations, and connect t

Strany 25

114 Managing deployment tasks Configuration guide From the navigation tree of the firewall management component, select Deployment Tasks under Policy

Strany 26 - Managing device groups

115 Table 108 Fields of the deployment task list Field Description Execution Status Execution status of the task. Task Name Name of the task. Task

Strany 27 - Adding a device group

116 SSL VPN auditing As Virtual Private Network (VPN) is much cheaper and more flexible to use than leased lines, more and more companies are establi

Strany 28 - Managing events

117 Online users trends The online user trend graph displays the number of online SSL VPN users during a day, week, month, or a customized period of

Strany 29 - Device interface event list

118 Figure 120 Daily user statistics NOTE: The User Count field shows the count of login times on that day. Device monitoring In addition to the

Strany 30

119 SSL VPN log auditing The SSL VPN log auditing function allows you to audit user access records, operation logs, resource accesses, and authentica

Strany 31 - Adding a template

120 Figure 123 Operation log auditing Resource access auditing The resource access auditing allows you to audit operations of SSL VPN users based o

Strany 32

121 Figure 125 Authentication failure auditing

Strany 33

122 Configuration example 1 Network requirements The H3C SecCenter Firewall Manager works with H3C firewall devices. The Firewall Manager collects at

Strany 34 - Importing device software

123 Figure 126 Add a device to the system management component 3. Select the Firewall Management component, and then select Device Management unde

Strany 35

7 Figure 6 Add a device Table 4 Configuration items Item Description Host Name/IP Required Type the name or IP address of the device to uniquely i

Strany 36 - Operator management

124 Index A B C D E I M N O P R S T U V A Abnormal traffic log auditing,56 Adding devices to the firewall manager,122 Authentication failure auditi

Strany 37 - Adding an operator

125 V Viewing device statistics,107 Virtual device group,60

Strany 38 - Managing operation logs

8 Item Description Web Username Required Specify the username for managing the device through web. The username can comprise up to 20 characters. We

Strany 39 - Changing your login password

9 Item Description Encryption Protocol Optional when you select the authentication protocol HMAC-MD5 or SMAC-SHA. Specify the encryption protocol to

Strany 40 - System configuration

10 Device software management Device software refers to the software that a firewall device runs to provide services. It can be regarded as the opera

Strany 41 - Configuring management ports

11 To deploy main boot file to devices: a. On the device software management page, click Deploy Device Software to enter the software deployment pa

Strany 42 - Configuring the mail server

12 Item Description Add Device Click this button to add a device to which you want to deploy a software version. You can add multiple devices. You c

Strany 43 - Managing filters

13 Figure 10 Software backup result If the backup operation fails, the system shows the reasons. The software backup files are stored in the softwa

Strany 44 - Adding a filter

Copyright © 2009-2012, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmi

Strany 45 - Managing LDAP servers

14 Figure 11 Device configuration management page Table 9 Device configuration management functions Function Description Backing up configuration f

Strany 46 - Adding an LDAP server

15 Figure 12 Backup configuration files Return to Device configuration management functions. 3. Restoring a configuration file a. From the naviga

Strany 47 - Monitoring the disk space

16 Figure 13 Restore configuration files Return to Device configuration management functions. 4. Device configuration information management On th

Strany 48

17 Tab Description Draft Allows you to manage drafts for a device. 5. Label A label is used to indicate the backup running and/or startup configu

Strany 49 - Managing subsystems

18 Figure 15 Compare two configuration files CAUTION: The label Currently indicates the configuration file is currently used by the device and the

Strany 50 - Adding a subsystem

19 Table 13 Fields of the running configuration list Field Description Version Uniquely identifies the running configuration file. The version number

Strany 51 - Item Descri

20 Table 14 Fields of the draft list Field Description Name Name of the draft. Description Remarks on the draft. Creation Time Time when the draft

Strany 52 - Firewall management

21 Figure 19 Device group management page Table 15 Device group management functions Function Description Device group list Allows you to view deta

Strany 53

22 Figure 20 Add a device group Table 17 Configuration items Item Description Device Group Name Required Type a name for the device group. The devi

Strany 54 - Recent events list

23 Table 18 Event management functions Function Description Device event list Allows you to view details about device events. Device interface eve

Strany 55 - Event analysis

Preface The H3C SecCenter Firewall Manager Configuration Guide describes the functions and configurations for the Firewall Manager system, including t

Strany 56

24 Figure 22 Device interface event list Table 21 describes the event query options. You can use any combination of the options to query for the ev

Strany 57 - Event details

25 Figure 23 Access template management page Table 23 Template management functions Function Description Template list Allows you to view details a

Strany 58

26 Figure 24 Add a template Table 25 Configuration items Item Description Template Name Required Type a name for the template, a string of 1 to 20

Strany 59 - Report exporting management

27 Item Description SNMP Version Required Select an SNMP version, which can be SNMPv1, SNMPv2, or SNMPv3. Authentication Username Required for SNMPv

Strany 60 - Report export file list

28 Figure 25 Device software database page Table 26 Device software database functions Function Description Importing device software Allows you t

Strany 61 - Adding a report export task

29 4. Click Apply. Figure 26 Device software import page Managing deployment tasks This function allows you to view all deployment task informatio

Strany 62 - Event auditing

30 Field Description Task Type Type of the deployment task Creation Time Time when the deployment task is created Creator Creator of the deploymen

Strany 63 - Operation log auditing

31 Figure 28 Operator management page Table 32 Operator management functions Function Description Operator list Allows you to view details about o

Strany 64 - NAT log auditing

32 Figure 29 Add an operator Table 34 Configuration items Item Description Login Name Type a name for the operator, a string of up to 40 character

Strany 65 - Security policy management

33 Figure 30 Operation log management page Table 35 Operation log query options Option Description Operator Specify the operator whose logs you ar

Strany 66 - Virtual device group

Port numbering in examples The port numbers in this document are for illustration only and might be unavailable on your device. Obtaining documentatio

Strany 67

34 Figure 31 Change your login password Table 37 Configuration items Item Description Old Password Required Type the current password. The passwor

Strany 68

35 Figure 32 System parameter setting Configuring management ports This module allows you to specify the SecCenter background ports for receiving v

Strany 69 - Managing virtual devices

36 Item Description NetStream V9 Logs Port Required Type the port for receiving NetStream V9 logs. The port number must be in the range from 1 to 65

Strany 70 - Adding a virtual device

37 Item Description Password Optional Type the password for identity authentication on the mail server. Sender’s Mail Address Required Type the mail

Strany 71 - Clearing virtual devices

38 Field Description Operation Click the icon of a filter to modify the settings of the filter. Return to Filter management functions. Adding a f

Strany 72 - Deploying a virtual device

39 Item Description Destination IP Optional Specify the destination IP addresses that you want the system to collect statistics on.Source Port Optio

Strany 73 - Security zones

40 Table 44 Fields of the LDAP server list Field Description Server Name Name of the LDAP server. Server IP Address IP address of the LDAP server.

Strany 74 - Adding a security zone

41 Item Description Admin DN Required Type the administrator DN for the LDAP server. Admin Password Required Type the administrator password for the

Strany 75 - Clearing security zones

42 2. Set the disk space alarm threshold so that the system issues an alarm whenever the free disk space is less than the threshold. Table 46 descri

Strany 76 - Applying a security zone

43 Figure 41 Free disk space monitoring page Managing subsystems The subsystem management allows you to manage and monitor multiple Firewall Manage

Strany 77 - Time ranges

i Contents Overview ··································································································································

Strany 78 - Adding a time range

44 Figure 42 Subsystem information Table 47 Fields of the subsystem list Field Description Server IP IP address of the server for the subsystem. P

Strany 79 - Services

45 Item Description User Name Required Type the username for logging in to the subsystem. The username can comprise up to 40 characters. Password Req

Strany 80 - User-defined services

46 Firewall management The Firewall Manager enables centralized management of firewall devices in the network, centralized event collection and analy

Strany 81

47 Figure 44 Snapshot of events Table 49 Event snapshot query options Option Description Device Select a device, a device group, or All devices fro

Strany 82 - Service groups

48 Recent events list The firewall management component presents firewall attack events not only through graphs but also on a table list. The recent

Strany 83

49 Device monitoring In addition to the attack event information of the entire network, the firewall management component also allows you to view the

Strany 84 - IP addresses

50 Figure 47 Attack event overview Table 53 Query options on the attack event overview page Option Description Device Select a device, a device gro

Strany 85 - Address ranges

51 Figure 48 Top 10 attack events contrast graph You can click the link to export all the analysis reports that the event overview function provi

Strany 86

52 Figure 49 Attack event details Table 54 Event details query options Option Description Device Select a device, a device group, or All devices fr

Strany 87

53 Table 55 Fields of the attack event details list Field Description Time Time when the attack event occurred Src IP Attack source IP address Dest

Strany 88 - Subnet addresses

ii Virtual device group ······························································································································

Strany 89

54 Table 57 Fields of the report export task list Field Description Report Task Name of the report export task. Creation Time Time when the task wa

Strany 90 - IP address groups

55 Field Description Creation Time Time when the report export file was created Return to Report export task management functions. Adding a report

Strany 91

56 Return to Report export task management functions. Event auditing The event auditing function allows you to audit abnormal traffic logs, blacklist

Strany 92 - Interzone rules

57 Figure 54 Abnormal traffic log auditing Blacklist log auditing Configuration guide From the navigation tree of the firewall management component

Strany 93 - Interzone rule list

58 Figure 56 Operation log auditing Other log auditing Configuration guide From the navigation tree of the firewall management component, select Ot

Strany 94 - Adding an interzone rule

59 Figure 58 NAT log auditing MPLS log auditing Configuration guide From the navigation tree of the firewall management component, select MPLS Logs

Strany 95

60 you to assign devices and virtual devices to different management roles for flexibility. The firewall devices then automatically identify and filt

Strany 96

61 Table 62 Fields of the virtual device group list Field Description Name Name of the virtual device group. Description Description of the virtual

Strany 97 - Interzone policy application

62 Figure 62 Authorize system administrators Return to Virtual device group management functions. Assigning virtual devices to a group 1. From the

Strany 98 - Adding an interzone policy

63 Managing virtual devices Configuration guide From the navigation tree of the firewall management component, select Virtual Devices under Security

Strany 99 - Rule management

1 Overview Introduction to H3C SecCenter Firewall Manager H3C SecCenter Firewall Manager is a powerful system for comprehensive analysis and centrali

Strany 100

64 Field Description User Name Username used to log in to the virtual device. User Password Password used to log in to the virtual device. Deployme

Strany 101 - Sorting interzone rules

65 Item Description Deploy to devices immediately Optional Select the check box and select the devices to deploy the virtual device to the selected d

Strany 102 - Applying interzone policies

66 Figure 67 Modify web management user name and password Return to Virtual device management functions. Deploying a virtual device 1. From the na

Strany 103 - Intrusion detection

67 Figure 68 Deploy a virtual device Return to Virtual device management functions. Security zones Configuration guide From the navigation tree of

Strany 104 - Blacklist

68 Function Description Adding a security zone Allows you to add a security zone. Clearing security zones Allows you to clear manageable security z

Strany 105 - Adding a blacklist entry

69 Figure 70 Add a security zone Table 68 Configuration items Item Description Security Zone ID Required Type an ID for the virtual device. The ID

Strany 106

70 Figure 71 Clear security zones Return to Security zone management functions. Modifying a security zone 1. From the navigation tree of the firew

Strany 107

71 The deployment result is shown on the security zone list as shown in Figure 69. To redeploy a security zone that fails the deployment, click the

Strany 108 - Packet inspection

72 Table 69 Time range management functions Function Description Time range list Allows you to view the detailed information of all time ranges. Add

Strany 109 - Packet inspectioni profiles

73 Table 71 Configuration items Item Description Name Required Type a name for the time range. The name can't be null and can't contain any

Strany 110

2 Installation and uninstallation Installing the firewall manager The software and hardware requirements of the Firewall Manager are as follows: • H

Strany 111 - Firewall device management

74 Table 72 Service management functions Function Description Predefined services Allows you to view the detailed information of all predefined serv

Strany 112 - Adding firewall devices

75 Field Description Operation Click the icon to modify the service. To add a user-define service: 1. Click Add on the user-defined service manage

Strany 113 - Viewing device statistics

76 Item Description Protocol Required Configure the protocol information for the user-define service. Select TCP, UDP, ICMP or Others. • If you selec

Strany 114 - Configuration guide

77 Figure 80 Add a service group Table 77 Configuration items Item Description Name Required Type a name for the service group. Valid characters fo

Strany 115 - Configuration segment list

78 IP addresses Configuration guide From the navigation tree of the firewall management component, select IP Addresses under Security Policy Manageme

Strany 116

79 Figure 82 Add a host address Table 80 Configuration items Item Description Name Required Type a name for the host address. Valid characters for

Strany 117

80 2. Click the Address Ranges tab to enter the address range management page, as shown in Figure 83. Table 81 describes the fields of the address ra

Strany 118

81 Figure 84 Add an address range Table 82 Configuration items Item Description Name Required Type a name for the address range. Valid characters f

Strany 119

82 Return to IP address management functions. Subnet addresses To view subnet addresses: 1. From the navigation tree of the firewall management compo

Strany 120 - Managing deployment tasks

83 Figure 86 Add an subnet address Table 84 Configuration items Item Description Name Required Type a name for the subnet address. Valid characters

Strany 121

3 2. Type your information as required and click Apply. The acknowledgment page appears, as shown in Figure 2. Click Download to download the host i

Strany 122 - SSL VPN auditing

84 Item Description Excluded Addresses Required Specify the IP addresses to be excluded from the subnet. • Input an IP address and click Add next to

Strany 123 - Daily user statistics

85 Figure 88 Add an IP address group Table 86 Configuration items Item Description Name Required Type a name for the IP address group. Valid charac

Strany 124 - Device monitoring

86 Interzone rules Configuration guide From the navigation tree of the firewall management component, select Interzone Rules under Security Policy Ma

Strany 125 - SSL VPN log auditing

87 Function Description Deleting interzone rules Allows you to delete interzone rules. Follow these steps: 1. Select the check boxes before the inte

Strany 126 - Resource access auditing

88 Filed Description Dest IP Destination IP address of the interzone rule. Service All services of the interzone rule. Time Range Time range durin

Strany 127

89 Figure 90 Add an interzone rule Table 90 Configuration items Item Description Virtual Device Required Select a virtual device for which you want

Strany 128 - Configuration example 1

90 Item Description Description Optional Type some descriptive information for the interzone rule. Valid characters for the description: letters, dig

Strany 129

91 Item Description Enable logging Optional Select this option to enable the syslog function for the interzone rule. By default, this option is not s

Strany 130

92 Function Description Deleting interzone policies Allows you to delete interzone policies. Follow these steps: 1. Select the check boxes before th

Strany 131

93 Figure 92 Add an interzone policy Table 93 Configuration items Item Description Name Required Type a name for the interzone policy. The name can

Komentáře k této Příručce

Žádné komentáře