H3C Technologies H3C SecCenter UTM Manager User Manual

Page 5

Advertising
background image

i

Contents

Overview ······································································································································································ 1

Introduction to H3C SecCenter UTM Manager ·············································································································1

What H3C SecCenter UTM Manager can do···············································································································1

Installation and uninstallation······································································································································ 2

Installing H3C SecCenter ·················································································································································2

Registering the UTM Manager·········································································································································4

Uninstalling the UTM Manager ·······································································································································5

Integration with iMC ···················································································································································· 7

Using SCMTOOL to integrate SecCenter into iMC·······································································································7

Removing SCMTOOL ·······················································································································································9

System management··················································································································································10

Device management ······················································································································································ 10

Managing device groups ····································································································································· 10

Managing device access templates ···················································································································· 12

Managing devices················································································································································· 15

Managing device software ·································································································································· 20

Managing the device configuration ···················································································································· 24

Managing the device software database··········································································································· 30

Managing deployment tasks································································································································ 32

Managing events··················································································································································· 33

Configuring device interface alarming ··············································································································· 35

Operator management·················································································································································· 35

Managing Operators············································································································································ 35

Managing operation logs····································································································································· 38

Changing your password····································································································································· 39

System configuration······················································································································································ 40

Configuring service parameters··························································································································· 40

Configuring system parameters ··························································································································· 41

Configuring management ports ··························································································································· 41

Configuring the mail server·································································································································· 43

Configuring SMS alarming ·································································································································· 44

Managing filters ···················································································································································· 45

Managing LDAP servers ······································································································································· 47

Configuring SMS alarming ·································································································································· 49

Configuring segments ··········································································································································· 50

Monitoring the disk space ···································································································································· 51

Managing subsystems··········································································································································· 53

Bandwidth management············································································································································56

Traffic snapshot ······························································································································································ 56

Traffic snapshot······················································································································································ 56

Segment traffic comparison·································································································································· 58

Traffic anomaly alarm··········································································································································· 59

Service traffic analysis by device group······················································································································ 61

Service traffic trend ··············································································································································· 61

Service traffic distribution ····································································································································· 65

Generic service analysis······································································································································· 68

Service traffic analysis by user ····································································································································· 69

Advertising