H3C Technologies H3C Intelligent Management Center User Manual

Page 966

Advertising
background image

952

a.

Clear the The policy is always effective box. All time periods appear in the Period List.

b.

Select one or more time periods.

14.

Click Next to enter the Protect Alarm Sources page to configure whether to protect the devices that
generate alarms.

15.

If you want the security control policy to protect the devices that generate alarms, click It takes
effect on all alarm sources. If you select this option, skip to Step 17.
The It takes effect on all alarm sources option is grayed out for alarms that do not contain alarm
source variables.

16.

If you want to specify the alarm sources to be protected by the security control policy, do the
following:

a.

Clear the It takes effect all periods box. The page displays Device List, Custom View List, and
Device Group List.

b.

Click Select Device in the Device List area and then select the devices you want to protect in the
popup window. For more information about selecting devices, see "

Adding devices by View

"

and "

Adding devices by Advanced query

."

c.

Click Select Custom View in the Custom View List area.
The Select Custom View window appears.

d.

Click Select All to select all custom views. Click Select None to clear none of the custom views.
Click Expand All to expand all custom views. Click Collapse All to collapse all custom

views. Click to the left of a custom view to expand all subviews of this view, and click to
collapse all subviews of this view.

e.

Select one or more custom views and click OK.
The selected custom views appear in the Custom View List. The security control policy protects
all alarm source devices on the selected custom views.

f.

Select one or more device groups in the Device Group List. The security control policy protects
all devices that belong to the selected device groups.

17.

Click Next to enter the Action Target page to set the target devices on which the action is taken.

18.

If you want the policy to take actions only to the devices that generate alarms, click On Alarm
Sources. If you select this option, skip to Step 20.

19.

If you want the policy to take actions to specific devices, do the following:

a.

Click On Special Objects.

b.

Click Select Device in the Device List area and then select devices in the popup window. For
more information about selecting devices, see "

Adding devices by View

" and "

Adding

devices by Advanced query

."

c.

Click Select Custom View in the Custom View List area.
The Select Custom View window appears.

d.

Click Select All to select all custom views. Click Select None to clear none of the custom views.
Click Expand All to expand all custom views. Click Collapse All to collapse all custom

views. Click to the left of a custom view to expand all subviews of this view, and click to

collapse all subviews of this view.

e.

Select one or more custom views and click OK.
The selected custom views appear in the Custom View List. The security control policy takes
actions to all devices on the selected custom views.

Advertising