HP Firewall Series Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software HP Firewall Series. HP Firewall Series User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 119
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - HP A-IMC Firewall Manager

HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805

Strany 2

6 Return to Device management functions. 3. Adding a device From the navigation tree of the system management component, select Device List under De

Strany 3 - Contents

96 SSL VPN log auditing The SSL VPN log auditing function allows you to audit user access records, operation logs, resource accesses, and authenticat

Strany 4

97 Figure 103 Operation log auditing Resource access auditing The resource access auditing allows you to audit operations of SSL VPN users based on

Strany 5 - Overview

98 Figure 105 Authentication failure auditing

Strany 6

99 Configuration example 1 Network requirements The HP A-IMC Firewall Manager works with HP firewall devices. The Firewall Manager collects attack ev

Strany 7

100 2. Select the Firewall Management component, and then select Device Management under Device Management from the navigation tree to enter the dev

Strany 8 - System management

101 Configuration example 2 Network requirements The FW device connects the internal network 4.1.1.0/24 through GigabitEthernet 0/4 and connects the

Strany 9

102 Select Firewall > ACL, configure rules for ACL 3000 to permit packets sourced from 4.1.1.0/24. Figure 111 Configure ACL 3000 3. Configure a

Strany 10

103 Figure 113 Add the FW device to the Firewall Manager A-F1000-E192.168.250.214 Configuring intrusion detection in firewall and sending logs to Fi

Strany 11

104 Figure 114 Configure a log host The port number should be in accordance with the management port number set in Firewall Manager, which can be s

Strany 12

105 Figure 116 Userlog NOTE: At present, flow logs refer to session logs only. To generate flow logs, you need to configure session logging accor

Strany 13 - Device software management

7 If you select Specify access parameters, specify the access parameters, including Web Username, Web Password, Web Port, Telnet Username, Telnet Pas

Strany 14

106 • Scanning detection • Blacklist • URPF check

Strany 15

107 NOTE: After configuring all the policies, please remember to click Apply to make them take effect. Verification Firewall logs and Firewall M

Strany 16 - Device config management

108 • Intrusion Policy Log • User log Displaying firewall management statistics on Firewall Manager As we have configured the firewall to sen

Strany 17

109 • Recent list • Inter-zone access logs

Strany 18

110 • Blacklist logs • Operation Logs

Strany 19

111 Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Befo

Strany 20 - 6. Running Config

112 Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text

Strany 21

113 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as

Strany 22 - Managing device groups

114 Index A B C D E F I M N O R S T U V W A Abnormal traffic log auditing,52 Adding devices to the firewall manager,99 Authentication failure auditi

Strany 23 - Adding a device group

115 User access records auditing,96 V Viewing device statistics,85 W Websites,111

Strany 24 - Managing events

8 Password Required when you select the authentication protocol HMAC-MD5 or SMAC-SHA. Specify the authentication password to be used for communicatio

Strany 25 - Device interface event list

9 Device software management Device software refers to the software that a firewall device runs to provide services. It can be regarded as the operat

Strany 26 - Template list

10 multiple devices at a time. You can specify deployment parameters, such as the deployment sequence, policy, time, and error handling mode. A succe

Strany 27 - Adding a template

11 (Parallel) or one by one (Serial). When the deployment sequence is serial, the icons are configurable for adjusting the sequence. Error Handling

Strany 28

12 Table 8 Fields of the software backup result list Field Description Device Label Device name and IP address Software Name Name of the software ba

Strany 29 - Importing device software

13 a device to another version. Synchronizing configurations Allows you to deploy new configuration settings to devices to make them take effect. Re

Strany 30 - Managing deployment tasks

14 3. Restoring a configuration file From the navigation tree of the system management component, select Device List under Device Management. The de

Strany 31 - Operator management

15 Table 11 Tabs on the device configuration information management page and functions provided Tab Description Label A label represents a configura

Strany 32 - Adding an operator

Legal and notice information © Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitt

Strany 33 - Managing operation logs

16 Figure 13 Compare two configuration files CAUTION: The label Currently indicates the configuration file is currently used by the device and the

Strany 34 - Changing your login password

17 Table 13 Fields of the running configuration list Field Description Version Uniquely identifies the running configuration file. The version number

Strany 35 - System configuration

18 Description Remarks on the draft. Creation Time Time when the draft is created. Last Modify Time Last time when the draft is modified. Compare

Strany 36 - Configuring the mail server

19 Table 15 Device group management functions Function Description Device group list Allows you to view details about device groups and modify and de

Strany 37 - Managing filters

20 Description Optional Type a description for the device group. The description can comprise up to 40 characters. Return to Device group management

Strany 38 - Adding a filter

21 Table 20 describes the fields of the device event list. You can select the check boxes before events and then click Delete to delete the events. T

Strany 39 - Managing LDAP servers

22 Managing device access templates The device access template management function allows you to configure information such as the device login passw

Strany 40 - Adding an LDAP server

23 Adding a template From the navigation tree of the system management component, select Access Template List under Device Management to enter the ac

Strany 41 - Monitoring the disk space

24 The strength of the password must meet the password strength requirements of the device. SNMP Version Required Select an SNMP version, which can b

Strany 42

25 Figure 23 Device software database page Table 26 Device software database functions Function Description Importing device software Allows you t

Strany 43 - Managing subsystems

i Contents Overview ··································································································································

Strany 44 - Adding a subsystem

26 Figure 24 Device software import page Managing deployment tasks This function allows you to view all deployment task information. Configuration

Strany 45

27 Creation Time Time when the deployment task is created Creator Creator of the deployment task Start Time Time when the deployment task starts E

Strany 46 - Firewall management

28 Table 32 Operator management functions Function Description Operator list Allows you to view details about operators, modify operator information

Strany 47

29 Table 34 Operator configuration items Item Description Login Name Type a name for the operator, a string of up to 40 characters. Login Password S

Strany 48 - Recent events list

30 Table 36 Fields of the operation log list Field Description Operator Name of the operator IP Address IP address of the PC used by the operator t

Strany 49 - Event analysis

31 System configuration Configuring system parameter Configure the system parameter to allow non-SNMP devices in the system. Configuration guide From

Strany 50

32 Type the port for receiving NAT logs. The port number must be in the range from 1 to 65534. Syslog Port Required Type the port for receiving syslo

Strany 51 - Event details

33 Type the username for identity authentication on the mail server. The password can comprise up to 80 characters. Password Optional Type the passwo

Strany 52

34 Field Description Operation Click the icon of a filter to modify the settings of the filter. Return to Filter management functions. Adding a f

Strany 53 - Report exporting management

35 Specify the source ports that you want the system to collect statistics on. Destination Port Optional Specify the destination ports that you want

Strany 54 - Report export file list

ii Security zones·····································································································································

Strany 55 - Event auditing

36 Table 44 Fields of the LDAP server list Field Description Server Name Name of the LDAP server Server IP Address IP address of the LDAP server Se

Strany 56

37 Admin Password Required Type the administrator password for the LDAP server. Username Attribute Required Type a username attribute for the LDAP se

Strany 57 - Operation log auditing

38 Figure 38 Disk space alarm configuration page Table 46 Alarm configuration items of the disk space for logs Item Description Warning Disk Space

Strany 58 - Other log auditing

39 Figure 39 Free disk space monitoring page Managing subsystems The subsystem management allows you to manage and monitor multiple Firewall Manage

Strany 59 - MPLS log auditing

40 Figure 40 Subsystem information Table 47 Fields of the subsystem list Field Description Server IP IP address of the server for the subsystem. P

Strany 60 - Security policy management

41 User Name Required Type the username for logging in to the subsystem. The username can comprise up to 40 characters. Password Required Specify the

Strany 61 - Adding a security zone

42 Firewall management The Firewall Manager enables centralized management of firewall devices in the network, centralized event collection and analy

Strany 62 - Time ranges

43 Figure 42 Snapshot of events Table 49 Event snapshot query options Option Description Device Select a device, a device group, or All devices fro

Strany 63 - Adding a time range

44 • In the Detail column of a TopN list, you can click the icon of an attack event to enter the attack event details page. For more information,

Strany 64 - Services

45 Device monitoring In addition to the attack event information of the entire network, the firewall management component also allows you to view the

Strany 65 - User-defined services

1 Overview Introduction to HP A-IMC Firewall Manager HP A-IMC Firewall Manager is a powerful system for comprehensive analysis and centralized manage

Strany 66

46 Figure 45 Attack event overview Table 53 Query options on the attack event overview page Option Description Device Select a device, a device gro

Strany 67 - Service groups

47 Figure 46 Top 10 attack events contrast graph You can click the link to export all the analysis reports that the event overview function provi

Strany 68

48 Figure 47 Attack event details Table 54 Event details query options Option Description Device Select a device, a device group, or All devices fr

Strany 69 - IP addresses

49 Table 55 Fields of the attack event details list Field Description Time Time when the attack event occurred Src IP Attack source IP address Dest

Strany 70

50 Table 57 Fields of the report export task list Field Description Report Task Name of the report export task Creation Time Time when the task was

Strany 71 - Address ranges

51 Return to Report export task management functions. Adding a report export task From the navigation tree of the firewall management component, sele

Strany 72 - Subnet addresses

52 The event auditing function does not support cross-day query. If the query period spans a day or the query start time is later than the end time,

Strany 73

53 Figure 52 Abnormal traffic log auditing Blacklist log auditing Configuration guide From the navigation tree of the firewall management component

Strany 74 - IP address groups

54 Figure 54 Operation log auditing Other log auditing Configuration guide From the navigation tree of the firewall management component, select Ot

Strany 75

55 NAT log auditing Configuration guide From the navigation tree of the firewall management component, select NAT Logs under Event Auditing to enter

Strany 76 - Interzone rules

2 Installation and uninstallation Installing the firewall manager The software and hardware requirements of the Firewall Manager are as follows: • H

Strany 77 - Adding an interzone rule

56 Figure 57 MPLS log auditing NOTE: If the IP address/port number is null in the database, NA will be displayed in the IP address or port field.

Strany 78 - Item Description

57 Adding a security zone Allows you to add a security zone. Importing security zones from a device Allows you to import security zones from a devic

Strany 79

58 Table 63 Security zone configuration item Item Description Security Zone Type a name for the security zone. A security zone name cannot contain an

Strany 80 - Interzone policies

59 Deleting a time range Allows you to click the icon of a time range to delete the time range. Time range list The time range list is on the time

Strany 81 - Rule management

60 and then select the days of the week during which the time period applies. By default, the periodic time period is from 0:0 to 24:0 every day. •

Strany 82

61 Protocol Protocol used by the service Protocol Parameters Parameters configured for the protocol Return to Service management functions. User-d

Strany 83 - Sorting interzone rules

62 Figure 65 Add a user-defined service Table 70 User-defined service configuration items Item Description Name Required Type a name for the user-d

Strany 84

63 To delete user-defined services, select them and click Delete on the user-defined service management page. Return to Service management functions.

Strany 85 - Applied rules list

64 Figure 67 Add a service group Table 72 Service group configuration items Item Description Name Required Type a name for the service group. Valid

Strany 86

65 IP addresses Configuration guide From the navigation tree of the firewall management component, select IP Addresses under Security Policy Manageme

Strany 87 - Firewall device management

3 Figure 2 Register your license After seeing the acknowledgement page, you can use the Firewall Manager to configure devices and perform other ope

Strany 88 - Adding firewall devices

66 Figure 69 Add a host address Table 75 Host address configuration items Item Description Name Required Type a name for the host address. Valid ch

Strany 89 - Viewing device statistics

67 Address ranges From the navigation tree of the firewall management component, select IP Addresses under Security Policy Management. Click the Addr

Strany 90 - Configuration segment list

68 Table 77 Address range configuration items Item Description Name Required Type a name for the address range. Valid characters for the name: letter

Strany 91

69 Subnet Subnet address and mask Excluded Addresses Addresses excluded from the subnet Description Descriptive information about the subnet addre

Strany 92

70 Specify a subnet address. The IP address must be in dotted decimal notation. Wildcard Required Select a wildcard mask for the subnet address. Excl

Strany 93

71 Figure 75 Add an IP address group Table 81 IP address group configuration items Item Description Name Required Type a name for the IP address gr

Strany 94

72 Interzone rules Configuration guide From the navigation tree of the firewall management component, select Interzone Rules under Security Policy Ma

Strany 95

73 Dest IP Query interzone rules by destination IP. Time Range Query interzone rules by time range. Policy Query interzone rules by policy. Status

Strany 96 - Field Description

74 Figure 77 Add an interzone rule Table 85 Interzone rule configuration items Item Description Src Zone Required Select a source zone for the inte

Strany 97 - SSL VPN auditing

75 Src IP Required Add source IP addresses for the interzone rule. • Available IP addresses are listed in the left box. The right box lists the sour

Strany 98 - Daily user statistics

4 System management The system management component is mainly used to configure the firewall devices to be managed by the Firewall Manager. To access

Strany 99 - Device monitoring

76 Enable this rule Optional Select this option to enable the interzone rule. By default, this option is not selected. Continue to add another rule O

Strany 100 - SSL VPN log auditing

77 Table 87 Fields of the interzone policy list Filed Description Policy Name Name of the interzone policy Description Descriptive information abou

Strany 101 - Resource access auditing

78 Figure 80 Rule management page Table 89 Fields of the policy’s rule list Filed Description ID ID of the interzone rule When you create an interz

Strany 102

79 Figure 81 Add interzone rules to the policy Return to Interzone policy management functions. Sorting interzone rules On an interzone policy’s ru

Strany 103 - Configuration example 1

80 Interzone policy applications Configuration guide From the navigation tree of the firewall management component, select Apply Interzone Policy und

Strany 104

81 Application Result Application result of the interzone policy Remarks Displays the security zones that are covered by some of the policy’s rules

Strany 105 - Configuration example 2

82 Figure 86 List of rules applied to a device Table 93 Applied rule list query options Option Description Src Zone Query interzone rules by sourc

Strany 106

83 Policy Policies that the interzone rule is in. You can click a policy name to enter the page for managing the policy's rules. See “Rule manag

Strany 107 - Firewall Manager

84 Firewall device list From the navigation tree of the firewall management component, select Device Management under Device Management. The firewall

Strany 108 - 2. Configure User Log

85 Return to Firewall management functions. Viewing device statistics The device statistics function can collect statistics on devices by day, week,

Strany 109

5 Figure 3 Device management page Table 1 Device management functions Function Description Device list Allows you to view details about devices, e

Strany 110

86 Figure 90 Device configuration segment management page Table 99 Configuration segment management functions Function Description Configuration se

Strany 111 - Verification

87 Description Detailed description of the configuration segment Operation • Click the icon of a configuration segment to rename the configuratio

Strany 112

88 Table 101 Configuration segment configuration items Item Description File Type Required Select the configuration segment type, cfg or xml. Filenam

Strany 113 - • Recent list

89 Deploying a configuration segment On the configuration segments list, click the icon of a configuration segment to configure a deployment task f

Strany 114

90 Figure 95 Configure deployment task attributes 4. Confirm your configuration. You can click the icon in the device list to view the configur

Strany 115 - Support and other resources

91 Managing deployment tasks Configuration guide From the navigation tree of the firewall management component, select Deployment Tasks under Policy

Strany 116 - Conventions

92 Table 103 Fields of the deployment task list Field Description Execution Status Execution status of the task Task Name Name of the task Task Typ

Strany 117 - Port numbering in examples

93 SSL VPN auditing As Virtual Private Network (VPN) is much cheaper and more flexible to use than leased lines, more and more companies are establis

Strany 118

94 Online users trends The online user trend graph displays the number of online SSL VPN users during a day, week, month, or a customized period of t

Strany 119

95 Figure 100 Daily user statistics NOTE: The User Count field shows the count of login times on that day. Device monitoring In addition to the

Komentáře k této Příručce

Žádné komentáře