Configuring intrusion detection – H3C Technologies H3C SecCenter UTM Manager User Manual

Page 248

Advertising
background image

240

NOTE:

Flow logs refer to session logs only. To get flow logs, you must configure session logging as shown below.

3.

Configure a session logging policy

Select Log Report > Session Log > Log Policy from the navigation tree, and click Add to create two

policies as shown below.

Configuring intrusion detection

Select Intrusion Detection from the navigation tree, enable packet inspection, enable scanning detections,

blacklist and URPF check.

Advertising