Deleting a user-defined alarm matching policy, Managing security control policies, Viewing the security control policy list – H3C Technologies H3C Intelligent Management Center User Manual

Page 960

Advertising
background image

946

When the attack location options configured, SCC displays the attack path for the alarm on the

attack topology.

7.

Modify the mappings between alarm variables and action variables in the Action/Alarm Variable
Mapping List:

a.

Click Add Mapping.
The Add Mapping window appears.

b.

Select an action variable from the Action Variable Name list. SCC preloads all action variables
it can identify in the list.

c.

Select an alarm variable from the Alarm Variable Name list. If the alarm does not contain
variables, the list is empty.

d.

Click OK.
The new mapping appears in the Action/Alarm Variable Mapping List.

e.

Repeat the previous steps to add more rules.

f.

To delete one or more mappings, click Delete for the associated mappings.

8.

Click OK.

Deleting a user-defined alarm matching policy

To delete a user-defined alarm matching policy:

1.

Navigate to Alarm > Alarm Matching Policy:

a.

Click the Alarm tab from the tabular navigation system on the top.

b.

Click the Security Control Center on the navigation tree on the left.

c.

Click the Alarm Matching Policy link located under Security Control Center on the navigation
tree on the left.

The Alarm Matching Policy List appears in the main pane of the Security Control Policy page.

2.

Click the Delete icon for the user-defined alarm matching policy you want to delete.

3.

Click OK to confirm deletion of the selected policy.

Managing security control policies

You can proactively manage the response to security threats and attacks using security control policies.

A security control policy combines three key pieces of information: 1) the identification and alarming of
a security attack; 2) an action that can be taken in response to the security attack; and 3) identification

of the portion of the network to be protected by the security control policy. The actions configured for

security control policies can be executed manually or they can be configured to run automatically upon

detection of the security attack.

Viewing the security control policy list

The Security Control Policy List provides you with a list of all configured security control policies in IMC.

From this list, you can view the policy names, descriptions, and execution types for each policy. From this
list, you can also modify and delete security control policies.
To view the Security Control Policy List:

Advertising