H3c-technologies H3C SecCenter Firewall Manager Manual de usuario

Busca en linea o descarga Manual de usuario para La Seguridad H3c-technologies H3C SecCenter Firewall Manager. H3C Technologies H3C SecCenter Firewall Manager User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 131
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
H3C SecCenter Firewall Manager
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document version: 6PW106-20120420
Vista de pagina 0
1 2 3 4 5 6 ... 130 131

Indice de contenidos

Pagina 1 - Configuration Guide

H3C SecCenter Firewall ManagerConfiguration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document version: 6PW

Pagina 2

4 Figure 4 Uninstall the Firewall Manager 3. Restart the operating system. 4. Remove all files and subdirectories under the SecCenter installatio

Pagina 3 - Preface

94 Table 94 Fields of the policy’s rule list Filed Description ID ID of the interzone rule. When you create an interzone rule, the system automatical

Pagina 4 - Documentation feedback

95 Figure 94 Add interzone rules to the policy Return to Interzone policy management functions. Sorting interzone rules On an interzone policy’s ru

Pagina 5 - Contents

96 Return to Fields of the policy’s rule list. Clearing interzone rules 1. From the navigation tree of the firewall management component, select App

Pagina 6

97 Figure 98 Apply an interzone policy to devices Intrusion detection The intrusion detection module provides configuration of blacklist entries an

Pagina 7 - Overview

98 Figure 99 Blacklist Table 95 Blacklist management functions Function Description Blacklist Allows you to view blacklist configuration of the vir

Pagina 8

99 Field Description Hold Time Lifetime in minutes of the blacklist entry. Deployment Result Result of the deployment operation. Operation • Click

Pagina 9

100 Item Description Virtual Device Group Required Select a virtual device group. A blacklist entry belongs to only one virtual device group. Return

Pagina 10

101 The deployment result is shown on the blacklist as shown in Figure 99. To redeploy a blacklist entry that fails the deployment, select the entry,

Pagina 11 - System management

102 Figure 103 Modify a blacklist entry Return to Blacklist management functions. Packet inspection The packet inspection function enables firewall

Pagina 12

103 Function Description Copying a packet inspection profile Allows you to copy a packet inspection profile to generate a new one. Follow these step

Pagina 13

5 System management The system management component of the Firewall Manager is mainly used to configure the firewall devices, the software, and the c

Pagina 14 - Item Descri

104 2. Click Add to enter the page for adding a packet inspection profile, as shown in Figure 105. 3. Configure the settings. 4. Click OK. Figure

Pagina 15

105 Figure 106 Deploy a packet inspection profile Return to Packet inspection management functions. CAUTION: You can deploy only one packet inspe

Pagina 16 - Device software management

106 Table 100 Firewall management functions Function Description Firewall device list Allows you to view information about the current firewall devi

Pagina 17

107 4. Select the check boxes before the devices that you want to add to the firewall management component, and click Add. The firewall device mana

Pagina 18

108 pre-defined segments, and modify, copy, delete, export, or deploy the custom configuration segments. You can also import configuration files from

Pagina 19 - Device config management

109 Configuration segment list The configuration segment list is on the configuration segment management page, as shown in Figure 110. Table 105 Fie

Pagina 20

110 Figure 111 Add a configuration segment Table 106 Configuration items Item Description File Type Required Select the configuration segment type,

Pagina 21

111 After the import operation completes successfully, a configuration segment by the name you specified will appear in the configuration segments li

Pagina 22

112 Figure 113 Select the devices you want to deploy the configuration segment to 2. Configure parameters—Type the SNMP version and community stri

Pagina 23

113 Figure 115 Configure deployment task attributes 4. Confirm your configuration. You can click the icon on the device list to view the config

Pagina 24 - 6. Running Config

6 Table 1 Device management functions Function Description Device list Allows you to view details about devices, export configurations, and connect t

Pagina 25

114 Managing deployment tasks Configuration guide From the navigation tree of the firewall management component, select Deployment Tasks under Policy

Pagina 26 - Managing device groups

115 Table 108 Fields of the deployment task list Field Description Execution Status Execution status of the task. Task Name Name of the task. Task

Pagina 27 - Adding a device group

116 SSL VPN auditing As Virtual Private Network (VPN) is much cheaper and more flexible to use than leased lines, more and more companies are establi

Pagina 28 - Managing events

117 Online users trends The online user trend graph displays the number of online SSL VPN users during a day, week, month, or a customized period of

Pagina 29 - Device interface event list

118 Figure 120 Daily user statistics NOTE: The User Count field shows the count of login times on that day. Device monitoring In addition to the

Pagina 30

119 SSL VPN log auditing The SSL VPN log auditing function allows you to audit user access records, operation logs, resource accesses, and authentica

Pagina 31 - Adding a template

120 Figure 123 Operation log auditing Resource access auditing The resource access auditing allows you to audit operations of SSL VPN users based o

Pagina 32

121 Figure 125 Authentication failure auditing

Pagina 33

122 Configuration example 1 Network requirements The H3C SecCenter Firewall Manager works with H3C firewall devices. The Firewall Manager collects at

Pagina 34 - Importing device software

123 Figure 126 Add a device to the system management component 3. Select the Firewall Management component, and then select Device Management unde

Pagina 35

7 Figure 6 Add a device Table 4 Configuration items Item Description Host Name/IP Required Type the name or IP address of the device to uniquely i

Pagina 36 - Operator management

124 Index A B C D E I M N O P R S T U V A Abnormal traffic log auditing,56 Adding devices to the firewall manager,122 Authentication failure auditi

Pagina 37 - Adding an operator

125 V Viewing device statistics,107 Virtual device group,60

Pagina 38 - Managing operation logs

8 Item Description Web Username Required Specify the username for managing the device through web. The username can comprise up to 20 characters. We

Pagina 39 - Changing your login password

9 Item Description Encryption Protocol Optional when you select the authentication protocol HMAC-MD5 or SMAC-SHA. Specify the encryption protocol to

Pagina 40 - System configuration

10 Device software management Device software refers to the software that a firewall device runs to provide services. It can be regarded as the opera

Pagina 41 - Configuring management ports

11 To deploy main boot file to devices: a. On the device software management page, click Deploy Device Software to enter the software deployment pa

Pagina 42 - Configuring the mail server

12 Item Description Add Device Click this button to add a device to which you want to deploy a software version. You can add multiple devices. You c

Pagina 43 - Managing filters

13 Figure 10 Software backup result If the backup operation fails, the system shows the reasons. The software backup files are stored in the softwa

Pagina 44 - Adding a filter

Copyright © 2009-2012, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmi

Pagina 45 - Managing LDAP servers

14 Figure 11 Device configuration management page Table 9 Device configuration management functions Function Description Backing up configuration f

Pagina 46 - Adding an LDAP server

15 Figure 12 Backup configuration files Return to Device configuration management functions. 3. Restoring a configuration file a. From the naviga

Pagina 47 - Monitoring the disk space

16 Figure 13 Restore configuration files Return to Device configuration management functions. 4. Device configuration information management On th

Pagina 48

17 Tab Description Draft Allows you to manage drafts for a device. 5. Label A label is used to indicate the backup running and/or startup configu

Pagina 49 - Managing subsystems

18 Figure 15 Compare two configuration files CAUTION: The label Currently indicates the configuration file is currently used by the device and the

Pagina 50 - Adding a subsystem

19 Table 13 Fields of the running configuration list Field Description Version Uniquely identifies the running configuration file. The version number

Pagina 51 - Item Descri

20 Table 14 Fields of the draft list Field Description Name Name of the draft. Description Remarks on the draft. Creation Time Time when the draft

Pagina 52 - Firewall management

21 Figure 19 Device group management page Table 15 Device group management functions Function Description Device group list Allows you to view deta

Pagina 53

22 Figure 20 Add a device group Table 17 Configuration items Item Description Device Group Name Required Type a name for the device group. The devi

Pagina 54 - Recent events list

23 Table 18 Event management functions Function Description Device event list Allows you to view details about device events. Device interface eve

Pagina 55 - Event analysis

Preface The H3C SecCenter Firewall Manager Configuration Guide describes the functions and configurations for the Firewall Manager system, including t

Pagina 56

24 Figure 22 Device interface event list Table 21 describes the event query options. You can use any combination of the options to query for the ev

Pagina 57 - Event details

25 Figure 23 Access template management page Table 23 Template management functions Function Description Template list Allows you to view details a

Pagina 58

26 Figure 24 Add a template Table 25 Configuration items Item Description Template Name Required Type a name for the template, a string of 1 to 20

Pagina 59 - Report exporting management

27 Item Description SNMP Version Required Select an SNMP version, which can be SNMPv1, SNMPv2, or SNMPv3. Authentication Username Required for SNMPv

Pagina 60 - Report export file list

28 Figure 25 Device software database page Table 26 Device software database functions Function Description Importing device software Allows you t

Pagina 61 - Adding a report export task

29 4. Click Apply. Figure 26 Device software import page Managing deployment tasks This function allows you to view all deployment task informatio

Pagina 62 - Event auditing

30 Field Description Task Type Type of the deployment task Creation Time Time when the deployment task is created Creator Creator of the deploymen

Pagina 63 - Operation log auditing

31 Figure 28 Operator management page Table 32 Operator management functions Function Description Operator list Allows you to view details about o

Pagina 64 - NAT log auditing

32 Figure 29 Add an operator Table 34 Configuration items Item Description Login Name Type a name for the operator, a string of up to 40 character

Pagina 65 - Security policy management

33 Figure 30 Operation log management page Table 35 Operation log query options Option Description Operator Specify the operator whose logs you ar

Pagina 66 - Virtual device group

Port numbering in examples The port numbers in this document are for illustration only and might be unavailable on your device. Obtaining documentatio

Pagina 67

34 Figure 31 Change your login password Table 37 Configuration items Item Description Old Password Required Type the current password. The passwor

Pagina 68

35 Figure 32 System parameter setting Configuring management ports This module allows you to specify the SecCenter background ports for receiving v

Pagina 69 - Managing virtual devices

36 Item Description NetStream V9 Logs Port Required Type the port for receiving NetStream V9 logs. The port number must be in the range from 1 to 65

Pagina 70 - Adding a virtual device

37 Item Description Password Optional Type the password for identity authentication on the mail server. Sender’s Mail Address Required Type the mail

Pagina 71 - Clearing virtual devices

38 Field Description Operation Click the icon of a filter to modify the settings of the filter. Return to Filter management functions. Adding a f

Pagina 72 - Deploying a virtual device

39 Item Description Destination IP Optional Specify the destination IP addresses that you want the system to collect statistics on.Source Port Optio

Pagina 73 - Security zones

40 Table 44 Fields of the LDAP server list Field Description Server Name Name of the LDAP server. Server IP Address IP address of the LDAP server.

Pagina 74 - Adding a security zone

41 Item Description Admin DN Required Type the administrator DN for the LDAP server. Admin Password Required Type the administrator password for the

Pagina 75 - Clearing security zones

42 2. Set the disk space alarm threshold so that the system issues an alarm whenever the free disk space is less than the threshold. Table 46 descri

Pagina 76 - Applying a security zone

43 Figure 41 Free disk space monitoring page Managing subsystems The subsystem management allows you to manage and monitor multiple Firewall Manage

Pagina 77 - Time ranges

i Contents Overview ··································································································································

Pagina 78 - Adding a time range

44 Figure 42 Subsystem information Table 47 Fields of the subsystem list Field Description Server IP IP address of the server for the subsystem. P

Pagina 79 - Services

45 Item Description User Name Required Type the username for logging in to the subsystem. The username can comprise up to 40 characters. Password Req

Pagina 80 - User-defined services

46 Firewall management The Firewall Manager enables centralized management of firewall devices in the network, centralized event collection and analy

Pagina 81

47 Figure 44 Snapshot of events Table 49 Event snapshot query options Option Description Device Select a device, a device group, or All devices fro

Pagina 82 - Service groups

48 Recent events list The firewall management component presents firewall attack events not only through graphs but also on a table list. The recent

Pagina 83

49 Device monitoring In addition to the attack event information of the entire network, the firewall management component also allows you to view the

Pagina 84 - IP addresses

50 Figure 47 Attack event overview Table 53 Query options on the attack event overview page Option Description Device Select a device, a device gro

Pagina 85 - Address ranges

51 Figure 48 Top 10 attack events contrast graph You can click the link to export all the analysis reports that the event overview function provi

Pagina 86

52 Figure 49 Attack event details Table 54 Event details query options Option Description Device Select a device, a device group, or All devices fr

Pagina 87

53 Table 55 Fields of the attack event details list Field Description Time Time when the attack event occurred Src IP Attack source IP address Dest

Pagina 88 - Subnet addresses

ii Virtual device group ······························································································································

Pagina 89

54 Table 57 Fields of the report export task list Field Description Report Task Name of the report export task. Creation Time Time when the task wa

Pagina 90 - IP address groups

55 Field Description Creation Time Time when the report export file was created Return to Report export task management functions. Adding a report

Pagina 91

56 Return to Report export task management functions. Event auditing The event auditing function allows you to audit abnormal traffic logs, blacklist

Pagina 92 - Interzone rules

57 Figure 54 Abnormal traffic log auditing Blacklist log auditing Configuration guide From the navigation tree of the firewall management component

Pagina 93 - Interzone rule list

58 Figure 56 Operation log auditing Other log auditing Configuration guide From the navigation tree of the firewall management component, select Ot

Pagina 94 - Adding an interzone rule

59 Figure 58 NAT log auditing MPLS log auditing Configuration guide From the navigation tree of the firewall management component, select MPLS Logs

Pagina 95

60 you to assign devices and virtual devices to different management roles for flexibility. The firewall devices then automatically identify and filt

Pagina 96

61 Table 62 Fields of the virtual device group list Field Description Name Name of the virtual device group. Description Description of the virtual

Pagina 97 - Interzone policy application

62 Figure 62 Authorize system administrators Return to Virtual device group management functions. Assigning virtual devices to a group 1. From the

Pagina 98 - Adding an interzone policy

63 Managing virtual devices Configuration guide From the navigation tree of the firewall management component, select Virtual Devices under Security

Pagina 99 - Rule management

1 Overview Introduction to H3C SecCenter Firewall Manager H3C SecCenter Firewall Manager is a powerful system for comprehensive analysis and centrali

Pagina 100

64 Field Description User Name Username used to log in to the virtual device. User Password Password used to log in to the virtual device. Deployme

Pagina 101 - Sorting interzone rules

65 Item Description Deploy to devices immediately Optional Select the check box and select the devices to deploy the virtual device to the selected d

Pagina 102 - Applying interzone policies

66 Figure 67 Modify web management user name and password Return to Virtual device management functions. Deploying a virtual device 1. From the na

Pagina 103 - Intrusion detection

67 Figure 68 Deploy a virtual device Return to Virtual device management functions. Security zones Configuration guide From the navigation tree of

Pagina 104 - Blacklist

68 Function Description Adding a security zone Allows you to add a security zone. Clearing security zones Allows you to clear manageable security z

Pagina 105 - Adding a blacklist entry

69 Figure 70 Add a security zone Table 68 Configuration items Item Description Security Zone ID Required Type an ID for the virtual device. The ID

Pagina 106

70 Figure 71 Clear security zones Return to Security zone management functions. Modifying a security zone 1. From the navigation tree of the firew

Pagina 107

71 The deployment result is shown on the security zone list as shown in Figure 69. To redeploy a security zone that fails the deployment, click the

Pagina 108 - Packet inspection

72 Table 69 Time range management functions Function Description Time range list Allows you to view the detailed information of all time ranges. Add

Pagina 109 - Packet inspectioni profiles

73 Table 71 Configuration items Item Description Name Required Type a name for the time range. The name can't be null and can't contain any

Pagina 110

2 Installation and uninstallation Installing the firewall manager The software and hardware requirements of the Firewall Manager are as follows: • H

Pagina 111 - Firewall device management

74 Table 72 Service management functions Function Description Predefined services Allows you to view the detailed information of all predefined serv

Pagina 112 - Adding firewall devices

75 Field Description Operation Click the icon to modify the service. To add a user-define service: 1. Click Add on the user-defined service manage

Pagina 113 - Viewing device statistics

76 Item Description Protocol Required Configure the protocol information for the user-define service. Select TCP, UDP, ICMP or Others. • If you selec

Pagina 114 - Configuration guide

77 Figure 80 Add a service group Table 77 Configuration items Item Description Name Required Type a name for the service group. Valid characters fo

Pagina 115 - Configuration segment list

78 IP addresses Configuration guide From the navigation tree of the firewall management component, select IP Addresses under Security Policy Manageme

Pagina 116

79 Figure 82 Add a host address Table 80 Configuration items Item Description Name Required Type a name for the host address. Valid characters for

Pagina 117

80 2. Click the Address Ranges tab to enter the address range management page, as shown in Figure 83. Table 81 describes the fields of the address ra

Pagina 118

81 Figure 84 Add an address range Table 82 Configuration items Item Description Name Required Type a name for the address range. Valid characters f

Pagina 119

82 Return to IP address management functions. Subnet addresses To view subnet addresses: 1. From the navigation tree of the firewall management compo

Pagina 120 - Managing deployment tasks

83 Figure 86 Add an subnet address Table 84 Configuration items Item Description Name Required Type a name for the subnet address. Valid characters

Pagina 121

3 2. Type your information as required and click Apply. The acknowledgment page appears, as shown in Figure 2. Click Download to download the host i

Pagina 122 - SSL VPN auditing

84 Item Description Excluded Addresses Required Specify the IP addresses to be excluded from the subnet. • Input an IP address and click Add next to

Pagina 123 - Daily user statistics

85 Figure 88 Add an IP address group Table 86 Configuration items Item Description Name Required Type a name for the IP address group. Valid charac

Pagina 124 - Device monitoring

86 Interzone rules Configuration guide From the navigation tree of the firewall management component, select Interzone Rules under Security Policy Ma

Pagina 125 - SSL VPN log auditing

87 Function Description Deleting interzone rules Allows you to delete interzone rules. Follow these steps: 1. Select the check boxes before the inte

Pagina 126 - Resource access auditing

88 Filed Description Dest IP Destination IP address of the interzone rule. Service All services of the interzone rule. Time Range Time range durin

Pagina 127

89 Figure 90 Add an interzone rule Table 90 Configuration items Item Description Virtual Device Required Select a virtual device for which you want

Pagina 128 - Configuration example 1

90 Item Description Description Optional Type some descriptive information for the interzone rule. Valid characters for the description: letters, dig

Pagina 129

91 Item Description Enable logging Optional Select this option to enable the syslog function for the interzone rule. By default, this option is not s

Pagina 130

92 Function Description Deleting interzone policies Allows you to delete interzone policies. Follow these steps: 1. Select the check boxes before th

Pagina 131

93 Figure 92 Add an interzone policy Table 93 Configuration items Item Description Name Required Type a name for the interzone policy. The name can

Comentarios a estos manuales

Sin comentarios