H3C Technologies H3C SecCenter IPS Manager User Manual

Page 5

Advertising
background image

i

Contents

Overview ······································································································································································ 1

Introduction to H3C SecCenter IPS Manager ················································································································1

What H3C SecCenter IPS Manager can do··················································································································1

Installation and uninstallation······································································································································ 2

Installing the IPS Manager ···············································································································································2

Registering the IPS Manager ···········································································································································2

Uninstalling the IPS Manager ··········································································································································3

System management···················································································································································· 5

Device management ·························································································································································5

Managing device groups ········································································································································5

Managing device access templates ·······················································································································6

Managing devices····················································································································································9

Managing events··················································································································································· 13

Configuring device interface alarming ··············································································································· 15

Operator management·················································································································································· 16

Managing operators ············································································································································· 16

Managing operation logs····································································································································· 18

Changing your login password ··························································································································· 19

System configuration······················································································································································ 20

Configuring service parameters··························································································································· 20

Configuring management ports ··························································································································· 21

Configuring the mail server·································································································································· 22

Configuring SMS alarming ·································································································································· 24

Managing filters ···················································································································································· 24

Monitoring the disk space ···································································································································· 27

Managing subsystems··········································································································································· 28

IPS management·························································································································································31

Overview········································································································································································· 31

IPS device management ················································································································································ 31

Managing IPS devices ·········································································································································· 31

Managing signature files······································································································································ 34

Displaying device statistics··································································································································· 36

Realtime monitoring ······················································································································································· 37

Displaying event snapshots ·································································································································· 37

Displaying attack/virus/DDoS snapshot list······································································································· 41

Monitoring IPS devices ········································································································································· 43

Event analysis ································································································································································· 43

Displaying attack/virus/DDoS attack event analysis reports ··········································································· 43

Displaying attack event details ···························································································································· 47

Displaying virus event details······························································································································· 50

Displaying DDoS event details····························································································································· 52

Configuring the alarming function······················································································································· 53

Managing report export tasks······························································································································ 56

Policy management························································································································································ 59

Configuring attack protection policies ················································································································ 59

Configuring anti-virus policies······························································································································ 63

Configuring policy applications ·························································································································· 67

Advertising