HP Firewall Series Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Software HP Firewall Series. HP Firewall Series User's Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 119
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes

Resumo do Conteúdo

Página 1 - HP A-IMC Firewall Manager

HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805

Página 2

6 Return to Device management functions. 3. Adding a device From the navigation tree of the system management component, select Device List under De

Página 3 - Contents

96 SSL VPN log auditing The SSL VPN log auditing function allows you to audit user access records, operation logs, resource accesses, and authenticat

Página 4

97 Figure 103 Operation log auditing Resource access auditing The resource access auditing allows you to audit operations of SSL VPN users based on

Página 5 - Overview

98 Figure 105 Authentication failure auditing

Página 6

99 Configuration example 1 Network requirements The HP A-IMC Firewall Manager works with HP firewall devices. The Firewall Manager collects attack ev

Página 7

100 2. Select the Firewall Management component, and then select Device Management under Device Management from the navigation tree to enter the dev

Página 8 - System management

101 Configuration example 2 Network requirements The FW device connects the internal network 4.1.1.0/24 through GigabitEthernet 0/4 and connects the

Página 9

102 Select Firewall > ACL, configure rules for ACL 3000 to permit packets sourced from 4.1.1.0/24. Figure 111 Configure ACL 3000 3. Configure a

Página 10

103 Figure 113 Add the FW device to the Firewall Manager A-F1000-E192.168.250.214 Configuring intrusion detection in firewall and sending logs to Fi

Página 11

104 Figure 114 Configure a log host The port number should be in accordance with the management port number set in Firewall Manager, which can be s

Página 12

105 Figure 116 Userlog NOTE: At present, flow logs refer to session logs only. To generate flow logs, you need to configure session logging accor

Página 13 - Device software management

7 If you select Specify access parameters, specify the access parameters, including Web Username, Web Password, Web Port, Telnet Username, Telnet Pas

Página 14

106 • Scanning detection • Blacklist • URPF check

Página 15

107 NOTE: After configuring all the policies, please remember to click Apply to make them take effect. Verification Firewall logs and Firewall M

Página 16 - Device config management

108 • Intrusion Policy Log • User log Displaying firewall management statistics on Firewall Manager As we have configured the firewall to sen

Página 17

109 • Recent list • Inter-zone access logs

Página 18

110 • Blacklist logs • Operation Logs

Página 19

111 Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Befo

Página 20 - 6. Running Config

112 Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text

Página 21

113 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as

Página 22 - Managing device groups

114 Index A B C D E F I M N O R S T U V W A Abnormal traffic log auditing,52 Adding devices to the firewall manager,99 Authentication failure auditi

Página 23 - Adding a device group

115 User access records auditing,96 V Viewing device statistics,85 W Websites,111

Página 24 - Managing events

8 Password Required when you select the authentication protocol HMAC-MD5 or SMAC-SHA. Specify the authentication password to be used for communicatio

Página 25 - Device interface event list

9 Device software management Device software refers to the software that a firewall device runs to provide services. It can be regarded as the operat

Página 26 - Template list

10 multiple devices at a time. You can specify deployment parameters, such as the deployment sequence, policy, time, and error handling mode. A succe

Página 27 - Adding a template

11 (Parallel) or one by one (Serial). When the deployment sequence is serial, the icons are configurable for adjusting the sequence. Error Handling

Página 28

12 Table 8 Fields of the software backup result list Field Description Device Label Device name and IP address Software Name Name of the software ba

Página 29 - Importing device software

13 a device to another version. Synchronizing configurations Allows you to deploy new configuration settings to devices to make them take effect. Re

Página 30 - Managing deployment tasks

14 3. Restoring a configuration file From the navigation tree of the system management component, select Device List under Device Management. The de

Página 31 - Operator management

15 Table 11 Tabs on the device configuration information management page and functions provided Tab Description Label A label represents a configura

Página 32 - Adding an operator

Legal and notice information © Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitt

Página 33 - Managing operation logs

16 Figure 13 Compare two configuration files CAUTION: The label Currently indicates the configuration file is currently used by the device and the

Página 34 - Changing your login password

17 Table 13 Fields of the running configuration list Field Description Version Uniquely identifies the running configuration file. The version number

Página 35 - System configuration

18 Description Remarks on the draft. Creation Time Time when the draft is created. Last Modify Time Last time when the draft is modified. Compare

Página 36 - Configuring the mail server

19 Table 15 Device group management functions Function Description Device group list Allows you to view details about device groups and modify and de

Página 37 - Managing filters

20 Description Optional Type a description for the device group. The description can comprise up to 40 characters. Return to Device group management

Página 38 - Adding a filter

21 Table 20 describes the fields of the device event list. You can select the check boxes before events and then click Delete to delete the events. T

Página 39 - Managing LDAP servers

22 Managing device access templates The device access template management function allows you to configure information such as the device login passw

Página 40 - Adding an LDAP server

23 Adding a template From the navigation tree of the system management component, select Access Template List under Device Management to enter the ac

Página 41 - Monitoring the disk space

24 The strength of the password must meet the password strength requirements of the device. SNMP Version Required Select an SNMP version, which can b

Página 42

25 Figure 23 Device software database page Table 26 Device software database functions Function Description Importing device software Allows you t

Página 43 - Managing subsystems

i Contents Overview ··································································································································

Página 44 - Adding a subsystem

26 Figure 24 Device software import page Managing deployment tasks This function allows you to view all deployment task information. Configuration

Página 45

27 Creation Time Time when the deployment task is created Creator Creator of the deployment task Start Time Time when the deployment task starts E

Página 46 - Firewall management

28 Table 32 Operator management functions Function Description Operator list Allows you to view details about operators, modify operator information

Página 47

29 Table 34 Operator configuration items Item Description Login Name Type a name for the operator, a string of up to 40 characters. Login Password S

Página 48 - Recent events list

30 Table 36 Fields of the operation log list Field Description Operator Name of the operator IP Address IP address of the PC used by the operator t

Página 49 - Event analysis

31 System configuration Configuring system parameter Configure the system parameter to allow non-SNMP devices in the system. Configuration guide From

Página 50

32 Type the port for receiving NAT logs. The port number must be in the range from 1 to 65534. Syslog Port Required Type the port for receiving syslo

Página 51 - Event details

33 Type the username for identity authentication on the mail server. The password can comprise up to 80 characters. Password Optional Type the passwo

Página 52

34 Field Description Operation Click the icon of a filter to modify the settings of the filter. Return to Filter management functions. Adding a f

Página 53 - Report exporting management

35 Specify the source ports that you want the system to collect statistics on. Destination Port Optional Specify the destination ports that you want

Página 54 - Report export file list

ii Security zones·····································································································································

Página 55 - Event auditing

36 Table 44 Fields of the LDAP server list Field Description Server Name Name of the LDAP server Server IP Address IP address of the LDAP server Se

Página 56

37 Admin Password Required Type the administrator password for the LDAP server. Username Attribute Required Type a username attribute for the LDAP se

Página 57 - Operation log auditing

38 Figure 38 Disk space alarm configuration page Table 46 Alarm configuration items of the disk space for logs Item Description Warning Disk Space

Página 58 - Other log auditing

39 Figure 39 Free disk space monitoring page Managing subsystems The subsystem management allows you to manage and monitor multiple Firewall Manage

Página 59 - MPLS log auditing

40 Figure 40 Subsystem information Table 47 Fields of the subsystem list Field Description Server IP IP address of the server for the subsystem. P

Página 60 - Security policy management

41 User Name Required Type the username for logging in to the subsystem. The username can comprise up to 40 characters. Password Required Specify the

Página 61 - Adding a security zone

42 Firewall management The Firewall Manager enables centralized management of firewall devices in the network, centralized event collection and analy

Página 62 - Time ranges

43 Figure 42 Snapshot of events Table 49 Event snapshot query options Option Description Device Select a device, a device group, or All devices fro

Página 63 - Adding a time range

44 • In the Detail column of a TopN list, you can click the icon of an attack event to enter the attack event details page. For more information,

Página 64 - Services

45 Device monitoring In addition to the attack event information of the entire network, the firewall management component also allows you to view the

Página 65 - User-defined services

1 Overview Introduction to HP A-IMC Firewall Manager HP A-IMC Firewall Manager is a powerful system for comprehensive analysis and centralized manage

Página 66

46 Figure 45 Attack event overview Table 53 Query options on the attack event overview page Option Description Device Select a device, a device gro

Página 67 - Service groups

47 Figure 46 Top 10 attack events contrast graph You can click the link to export all the analysis reports that the event overview function provi

Página 68

48 Figure 47 Attack event details Table 54 Event details query options Option Description Device Select a device, a device group, or All devices fr

Página 69 - IP addresses

49 Table 55 Fields of the attack event details list Field Description Time Time when the attack event occurred Src IP Attack source IP address Dest

Página 70

50 Table 57 Fields of the report export task list Field Description Report Task Name of the report export task Creation Time Time when the task was

Página 71 - Address ranges

51 Return to Report export task management functions. Adding a report export task From the navigation tree of the firewall management component, sele

Página 72 - Subnet addresses

52 The event auditing function does not support cross-day query. If the query period spans a day or the query start time is later than the end time,

Página 73

53 Figure 52 Abnormal traffic log auditing Blacklist log auditing Configuration guide From the navigation tree of the firewall management component

Página 74 - IP address groups

54 Figure 54 Operation log auditing Other log auditing Configuration guide From the navigation tree of the firewall management component, select Ot

Página 75

55 NAT log auditing Configuration guide From the navigation tree of the firewall management component, select NAT Logs under Event Auditing to enter

Página 76 - Interzone rules

2 Installation and uninstallation Installing the firewall manager The software and hardware requirements of the Firewall Manager are as follows: • H

Página 77 - Adding an interzone rule

56 Figure 57 MPLS log auditing NOTE: If the IP address/port number is null in the database, NA will be displayed in the IP address or port field.

Página 78 - Item Description

57 Adding a security zone Allows you to add a security zone. Importing security zones from a device Allows you to import security zones from a devic

Página 79

58 Table 63 Security zone configuration item Item Description Security Zone Type a name for the security zone. A security zone name cannot contain an

Página 80 - Interzone policies

59 Deleting a time range Allows you to click the icon of a time range to delete the time range. Time range list The time range list is on the time

Página 81 - Rule management

60 and then select the days of the week during which the time period applies. By default, the periodic time period is from 0:0 to 24:0 every day. •

Página 82

61 Protocol Protocol used by the service Protocol Parameters Parameters configured for the protocol Return to Service management functions. User-d

Página 83 - Sorting interzone rules

62 Figure 65 Add a user-defined service Table 70 User-defined service configuration items Item Description Name Required Type a name for the user-d

Página 84

63 To delete user-defined services, select them and click Delete on the user-defined service management page. Return to Service management functions.

Página 85 - Applied rules list

64 Figure 67 Add a service group Table 72 Service group configuration items Item Description Name Required Type a name for the service group. Valid

Página 86

65 IP addresses Configuration guide From the navigation tree of the firewall management component, select IP Addresses under Security Policy Manageme

Página 87 - Firewall device management

3 Figure 2 Register your license After seeing the acknowledgement page, you can use the Firewall Manager to configure devices and perform other ope

Página 88 - Adding firewall devices

66 Figure 69 Add a host address Table 75 Host address configuration items Item Description Name Required Type a name for the host address. Valid ch

Página 89 - Viewing device statistics

67 Address ranges From the navigation tree of the firewall management component, select IP Addresses under Security Policy Management. Click the Addr

Página 90 - Configuration segment list

68 Table 77 Address range configuration items Item Description Name Required Type a name for the address range. Valid characters for the name: letter

Página 91

69 Subnet Subnet address and mask Excluded Addresses Addresses excluded from the subnet Description Descriptive information about the subnet addre

Página 92

70 Specify a subnet address. The IP address must be in dotted decimal notation. Wildcard Required Select a wildcard mask for the subnet address. Excl

Página 93

71 Figure 75 Add an IP address group Table 81 IP address group configuration items Item Description Name Required Type a name for the IP address gr

Página 94

72 Interzone rules Configuration guide From the navigation tree of the firewall management component, select Interzone Rules under Security Policy Ma

Página 95

73 Dest IP Query interzone rules by destination IP. Time Range Query interzone rules by time range. Policy Query interzone rules by policy. Status

Página 96 - Field Description

74 Figure 77 Add an interzone rule Table 85 Interzone rule configuration items Item Description Src Zone Required Select a source zone for the inte

Página 97 - SSL VPN auditing

75 Src IP Required Add source IP addresses for the interzone rule. • Available IP addresses are listed in the left box. The right box lists the sour

Página 98 - Daily user statistics

4 System management The system management component is mainly used to configure the firewall devices to be managed by the Firewall Manager. To access

Página 99 - Device monitoring

76 Enable this rule Optional Select this option to enable the interzone rule. By default, this option is not selected. Continue to add another rule O

Página 100 - SSL VPN log auditing

77 Table 87 Fields of the interzone policy list Filed Description Policy Name Name of the interzone policy Description Descriptive information abou

Página 101 - Resource access auditing

78 Figure 80 Rule management page Table 89 Fields of the policy’s rule list Filed Description ID ID of the interzone rule When you create an interz

Página 102

79 Figure 81 Add interzone rules to the policy Return to Interzone policy management functions. Sorting interzone rules On an interzone policy’s ru

Página 103 - Configuration example 1

80 Interzone policy applications Configuration guide From the navigation tree of the firewall management component, select Apply Interzone Policy und

Página 104

81 Application Result Application result of the interzone policy Remarks Displays the security zones that are covered by some of the policy’s rules

Página 105 - Configuration example 2

82 Figure 86 List of rules applied to a device Table 93 Applied rule list query options Option Description Src Zone Query interzone rules by sourc

Página 106

83 Policy Policies that the interzone rule is in. You can click a policy name to enter the page for managing the policy's rules. See “Rule manag

Página 107 - Firewall Manager

84 Firewall device list From the navigation tree of the firewall management component, select Device Management under Device Management. The firewall

Página 108 - 2. Configure User Log

85 Return to Firewall management functions. Viewing device statistics The device statistics function can collect statistics on devices by day, week,

Página 109

5 Figure 3 Device management page Table 1 Device management functions Function Description Device list Allows you to view details about devices, e

Página 110

86 Figure 90 Device configuration segment management page Table 99 Configuration segment management functions Function Description Configuration se

Página 111 - Verification

87 Description Detailed description of the configuration segment Operation • Click the icon of a configuration segment to rename the configuratio

Página 112

88 Table 101 Configuration segment configuration items Item Description File Type Required Select the configuration segment type, cfg or xml. Filenam

Página 113 - • Recent list

89 Deploying a configuration segment On the configuration segments list, click the icon of a configuration segment to configure a deployment task f

Página 114

90 Figure 95 Configure deployment task attributes 4. Confirm your configuration. You can click the icon in the device list to view the configur

Página 115 - Support and other resources

91 Managing deployment tasks Configuration guide From the navigation tree of the firewall management component, select Deployment Tasks under Policy

Página 116 - Conventions

92 Table 103 Fields of the deployment task list Field Description Execution Status Execution status of the task Task Name Name of the task Task Typ

Página 117 - Port numbering in examples

93 SSL VPN auditing As Virtual Private Network (VPN) is much cheaper and more flexible to use than leased lines, more and more companies are establis

Página 118

94 Online users trends The online user trend graph displays the number of online SSL VPN users during a day, week, month, or a customized period of t

Página 119

95 Figure 100 Daily user statistics NOTE: The User Count field shows the count of login times on that day. Device monitoring In addition to the

Comentários a estes Manuais

Sem comentários