Configuring attack protection policies, Configuration guide – H3C Technologies H3C SecCenter UTM Manager User Manual

Page 166

Advertising
background image

158

Configuring attack protection policies

Attack protection policies enable devices to filter attacks such as backdoor program, spyware, DoS

attacks, and DDoS attacks. On the attack protection policies management page, you can add, modify,

copy, and delete a user-defined attack protection policy.

NOTE:

attack_policy is the default attack protection policy. It cannot be modified or deleted.

Configuration guide

From the navigation tree of the IPS management component, select Attack Protection Policies under

Policy Management to enter the attack protection policies management page, as shown in

Figure 149

.

Table 135

describes the attack policy management functions.

Figure 149 Attack protection policies management page

Table 135 Attack policy management functions

Function Description

Querying policies

Allows you to query policies by policy name.
Type a policy name keyword and click Query. The system will display all

attack protection policies whose names contain the keyword.

Attack protection policies list

Allows you to view all attack protection policies.

Adding an attack protection
policy

Allows you to add a new attack protection policy.

Deleting attack protection
policies

Allows you to delete attack protection policies.

Authorizing operators

Authorizes specific operators to manage the attack protection policies.
Follow these steps:

1.

Select the check boxes before the policies that you want to permit

operators to manage.

2.

Click Authorize.

3.

Select the operators, and click Apply.

Canceling authorization

Removes operators from the authorized operators of the task. The operation
procedure is similar to operator authorization procedure.

Advertising