HP 200 Unified Threat Management (UTM) Appliance Series Guide de démarrage rapide

Naviguer en ligne ou télécharger Guide de démarrage rapide pour Logiciel HP 200 Unified Threat Management (UTM) Appliance Series. HP 200 Unified Threat Management (UTM) Appliance Series Getting Started Guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 150
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
HP Firewalls and UTM Devices
Getting Started Guide
Part number: 5998-4163
Software version:
F1000-A-EI: Feature 3722
F1000-S-EI: Feature 3722
F5000: Feature 3211
F1000-E: Feature 3174
Firewall module: Feature 3174
Enhanced firewall module: ESS 3807
U200-A: ESS 5132
U200-S: ESS 5132
Document version: 6PW100-20121228
Vue de la page 0
1 2 3 4 5 6 ... 149 150

Résumé du contenu

Page 1 - Getting Started Guide

HP Firewalls and UTM Devices Getting Started Guide Part number: 5998-4163 Software version: F1000-A-EI:

Page 2

4 • Protection against external attacks, internal network protection, traffic monitoring, email filtering, Web filtering, application layer filtering

Page 3 - Contents

94 Step Command Remarks 4. Set a daylight saving time scheme. • Set a non-recurring scheme: clock summer-time zone-name one-off start-time start-d

Page 4

95 Enabling displaying the copyright statement The device by default displays the copyright statement when a Telnet or SSH user logs in, or when a co

Page 5 - 350H125

96 { Method 1—Press Enter after the last command keyword. At the system prompt, enter the banner message and end with the delimiter character %. For

Page 6

97 When multiple users configure a setting in system view, only the last configuration applies. To configure the maximum number of concurrent users:

Page 7 - Overview

98 Figure 72 Rebooting the device 2. If necessary, select Check whether the configuration is saved to the configuration file for next reboot. If y

Page 8

99 Task Command Remarks Schedule a reboot. • Schedule a reboot to occur at a specific time and date: schedule reboot at hh:mm [ date ] • Schedule

Page 9

100 • After job execution, the configuration interface, view, and user status that you have before job execution restores even if the job ran a comm

Page 10 - Appearance

101 Step Command Remarks 4. Add commands to the job. • Configure a command to run at a specific time and date: time time-id at time date command co

Page 11 - Firewall modules

102 [Firewall-job-pc1] time 2 repeating at 18:00 week-day mon tue wed thu fri command shutdown [Firewall-job-pc1] quit # Create a job named pc2, and

Page 12 - Enhanced firewall modules

103 To set the port status detection timer: Step Command Remarks 1. Enter system view. system-view N/A 2. Set the port status detection timer. sh

Page 13 - UTM products

5 Figure 6 Rear view 1: Rear chassis cover handle (do not use this handle to lift the chassis) 2: (Optional) Air filter 3: Chassis handle 4: Ground

Page 14

104 Hardware Feature compatible Firewall module 12500/10500 Enhanced FW: Yes Others: No U200-A Yes U200-S No You can set the temperature thresholds

Page 15 - Application scenarios

105 To ensure management continuity, you can configure the device to monitor the NMS connected interface for IP address changes and notify the NMS to

Page 16 - VPN application

106 Verifying and diagnosing transceiver modules This section describes how to verify and diagnose transceiver modules. Verifying transceiver m

Page 17 - F1000-E

107 Displaying and maintaining device management For diagnosis or troubleshooting, you can use separate display commands to collect running statu

Page 18

108 Task Command Remarks Display basic device temperature information. display environment [ cpu ] [ | { begin | exclude | include } regular-expressi

Page 19

109 Task Command Remarks Display the exception handling method. display system-failure [ | { begin | exclude | include } regular-expression ] Availab

Page 20 - Remote access application

110 Managing users Local users are a set of user attributes configured on the local device. A local user is uniquely identified by username. To enabl

Page 21 - Firewall application

111 2. Click Add. Figure 75 Adding a local user 3. Configure a local user, as described in Table 19. 4. Click Apply. Table 19 Configuration item

Page 22 - Figure 24 Network diagram

112 Item Description Virtual Device Set the virtual device to which a user belongs. Every time a user logs in through the Web interface, the user log

Page 23 - Login overview

113 Figure 77 Creating a local user c. Enter Emily as the username. d. Select the user privilege level Monitor. e. Select the service type Web.

Page 24 - CLI user interfaces

6 Appearance Figure 7 Firewall module for 5800 switches Figure 8 Firewall module for 7500E/9500E/12500 switches Figure 9 Firewall module for 6600/

Page 25

114 Configuring source IP-based Telnet login control Step Command Remarks 1. Enter system view. system-view N/A 2. Create a basic ACL and enter it

Page 26 - Logging in to the CLI

115 Step Command Remarks 3. Configure an ACL rule. rule [ rule-id ] { permit | deny } rule-string N/A 4. Exit advanced ACL view. quit N/A 5. Ente

Page 27

116 Figure 78 Network diagram Configuration procedure # Configure basic ACL 2000, and configure rule 1 to permit packets sourced from Host B, and r

Page 28

117 Step Command Remarks 3. Configure an ACL rule. rule [ rule-id ] { deny | permit } [ counting | fragment | logging | source { sour-addr sour-wild

Page 29

118 Figure 79 Network diagram Configuration procedure # Create ACL 2000, and configure rule 1 to permit packets sourced from Host B, and rule 2 to

Page 30

119 Step Command Remarks 3. Create rules for this ACL. rule [ rule-id ] { deny | permit } [ counting | fragment | logging | source { sour-addr sour-

Page 31 - Command

120 [Firewall] ip http acl 2030 Displaying online users Online users refer to the users who have passed authentication and got online. You can view i

Page 32

121 Using the CLI At the command-line interface (CLI), you can enter text commands to configure, manage, and monitor your device. Figure 82 CLI examp

Page 33 - Logging in through Telnet

122 Figure 83 Understanding command-line parameters For example, to set the system time to 10:30:20, February 23, 2010, enter the following command

Page 34

123 Figure 84 CLI view hierarchy Entering system view from user view Task Command Enter system view from user view. system-view Returning to the

Page 35

7 • External attack protection, internal network protection, traffic monitoring, URL filtering, application layer filtering. • ASPF • Email alarm,

Page 36

124 Accessing the CLI online help The CLI online help is context sensitive. You can enter a question mark at any prompt or in any position of a comma

Page 37

125 Entering a command When you enter a command, you can use keys or hotkeys to edit the command line, or use abbreviated keywords or keyword aliases

Page 38

126 Configuring and using command keyword aliases The command keyword alias function allows you to replace the first keyword of a non-undo command or

Page 39

127 Step Command Remarks 3. Display hotkeys. display hotkey [ | { begin | exclude | include } regular-expression ] Optional. Available in any view.

Page 40

128 output such as logs. If you have entered nothing, the system does not display the command-line prompt after the output. To enable redisplaying en

Page 41 - Logging in through SSH

129 Viewing history commands You can use arrow keys to access history commands in Windows 200x and Windows XP Terminal or Telnet. In Windows 9x Hyper

Page 42

130 To display all output at one time and refresh the screen continuously until the last screen is displayed: Task Command Remarks Disable pausing b

Page 43

131 Character Meaning Examples _ If it is at the beginning or the end of a regular expression, it equals ^ or $. In other cases, it equals comma, spa

Page 44 - Started Command Reference

132 Character Meaning Examples character1\w Matches character1character2. character2 must be a number, letter, or underline, and \w equals [A-Za-z0-9

Page 45

133 Table 28 Command levels and user privilege levels Level Privilege Default set of commands 0 Visit Includes commands for network diagnosis and com

Page 46

8 Appearance U200-A Figure 10 U200-A front view 1: Copper Ethernet ports (GE0 to GE5) 2: Console port (CONSOLE) 3: USB port 4: CF ejector button 5:

Page 47

134 Step Command Remarks 5. Configure the authentication mode for SSH users as password. For more information, see System Management and Maintenance

Page 48

135 Step Command Remarks 5. Configure the user privilege level. user privilege level level By default, the user privilege level for users logged in

Page 49

136 # Display the commands a Telnet user can use after login. Because the user privilege level is 1, a Telnet user can use more commands now. <Sys

Page 50

137 Configuring the authentication parameters for user privilege level switching A user can switch to a lower privilege level without authentication.

Page 51

138 Switching to a higher user privilege level Before you switch to a higher user privilege level, obtain the required authentication data as describ

Page 52 - Login procedure

139 Changing the level of a command Every command in a view has a default command level. The default command level scheme is sufficient for the secur

Page 53

140 Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Befo

Page 54

141 Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text

Page 55

142 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as

Page 56

143 Index A 187HC 188HD 189HE 190HF 191HH 192HL 193HM 194HO 195HP 196HR 197HS 198HT 199HU 200HV A Accessing the CLI online help,468H124 Adding a We

Page 57 - Configuration guidelines

9 U200-S Figure 12 U200-S front view 1: Copper Ethernet ports (GE0 to GE4) 2: Console port (CONSOLE) 3: USB port 4: CF ejector button 5: CF card slo

Page 58 - Configuring Web login

144 R Rebooting the device,97 Related information,14 0 S Saving the running configuration,13 9 Scheduling jobs,99 Setting the idle timeout timer at

Page 59 - Configuring HTTP login

10 Figure 14 Network diagram Virtual firewall application The F1000-A-EI/F1000-S-EI supports the virtual firewall function. You can create multiple

Page 60 - Configuring HTTPS login

11 Figure 16 Network diagram F1000-E Deployed at the egress of an enterprise network, F1000-E firewalls can protect against external attacks, ensure

Page 61

12 F5000 Large data centers are connected to the 10G core network usually through a 10G Ethernet. The F5000 firewall has a 10G processing capability a

Page 62

13 Figure 19 Network diagram Enhanced firewall modules Clound computing data center application The Enhanced firewall modules can provide high-perfo

Page 63

Legal and notice information © Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitt

Page 64

14 Enterprise network applicatoin Deployed in the core switch or the aggregation switch of an enterprise network, the Enhanced firewall module provide

Page 65

15 UTM Firewall application The UTM Security Products can be deployed at the exits of small- to medium-sized enterprise networks to defend against att

Page 66 - Troubleshooting Web browser

16 Figure 24 Network diagram

Page 67 - 3. Click Custom Level

17 Login overview This chapter describes the available login methods and introduces the related concepts. Login methods at a glance You can access th

Page 68

18 Login method Default setting and configuration requirements Accessing the device through SNMP By default, SNMP login is disabled. To use SNMP ser

Page 69

19 A relative number uniquely identifies a user interface among all user interfaces that are the same type. The number format is user interface type

Page 70 - Configuring SNMP access

20 Logging in to the CLI By default, the first time you access the CLI you must log in through the console port. At the CLI, you can configure Telnet

Page 71

21 Figure 26 Connection description Figure 27 Specifying the serial port used to establish the connection

Page 72 - SNMP login example

22 Figure 28 Setting the properties of the serial port 5. Power on the device and press Enter at the prompt. Figure 29 CLI 6. At the default us

Page 73 - 2. Configure the NMS:

23 • Scheme—Uses the AAA module to provide local or remote console login authentication. You must provide a username and password for accessing the

Page 74

i Contents Overview ··································································································································

Page 75

24 Configuring password authentication for console login Step Command Remarks 1. Enter system view. system-view N/A 2. Enter console user interfa

Page 76 - ACSEI startup and running

25 Step Command Remarks 3. Enable scheme authentication. authentication-mode scheme Whether local, RADIUS, or HWTACACS authentication is adopted dep

Page 77

26 The next time you attempt to log in through the console port, you must provide the configured login username and password. Configuring common cons

Page 78

27 Step Command Remarks 9. Specify the terminal display type. terminal type { ansi | vt100 } By default, the terminal display type is ANSI. The devi

Page 79

28 Table 5 shows the Telnet server and client configuration required for a successful Telnet login. Table 5 Telnet server and Telnet client configura

Page 80 - Basic configuration

29 Authentication mode Configuration tasks Reference Scheme Enable scheme authentication on the VTY user interface. Configure local or remote authen

Page 81 - Click Next

30 Figure 31 Telnetting to the device without authentication Configuring password authentication for Telnet login Step Command Remarks 1. Enter s

Page 82

31 Figure 32 Password authentication interface for Telnet login Configuring scheme authentication for Telnet login When scheme authentication is us

Page 83

32 Step Command Remarks 3. Enter one or multiple VTY user interface views. user-interface vty first-number [ last-number ] N/A 4. Enable scheme aut

Page 84

33 Step Command Remarks 14. Configure common settings for VTY user interfaces. See "Configuring common VTY user interface settings (optional).&

Page 85

ii Configuring scheme authentication for AUX login ···························································································· 42Con

Page 86

34 Step Command Remarks 4. Enable the user interfaces to support Telnet, SSH, or both of them. protocol inbound { all | ssh | telnet } Optional. By

Page 87

35 Figure 34 Telnetting from the device to a Telnet server To use the device to log in to a Telnet server: Step Command Remarks 1. Enter system v

Page 88

36 Table 7 SSH server and client requirements Device role Requirements SSH server Assign an IP address to an interface of the device, and make sure

Page 89

37 Step Command Remarks 4. Enter one or multiple VTY user interface views. user-interface vty first-number [ last-number ] N/A 5. Enable scheme aut

Page 90 - Managing the device

38 Step Command Remarks 14. Specify SSH service for the user. service-type ssh By default, the system-predefined user admin can use terminal servic

Page 91 - Configuring the system time

39 Hardware Feature compatible F1000-E Yes F5000 Yes Firewall module No U200-A No U200-S No As shown in Figure 37, to perform local login through t

Page 92 - Configuring the network time

40 Authentication mode Configuration tasks Reference Scheme Enable scheme authentication on the AUX user interface. Configure local or remote authen

Page 93

41 Figure 38 Accessing the CLI through the AUX port without authentication Configuring password authentication for AUX login Step Command Remarks

Page 94

42 Figure 39 Password authentication interface for AUX login Configuring scheme authentication for AUX login When scheme authentication is used, yo

Page 95

43 Step Command Remarks 3. Enable scheme authentication. authentication-mode scheme By default, password authentication is enabled on AUX user inter

Page 96

iii Configuration guidelines ·························································································································

Page 97

44 Figure 40 Scheme authentication interface for AUX login Configuring common settings for AUX login (optional) Some common settings configured fo

Page 98

45 Step Command Remarks 6. Specify the number of stop bits. stopbits { 1 | 1.5 | 2 } The default is 1. Stop bits indicate the end of a character. Th

Page 99

46 The port properties of the terminal emulation program must be the same as the default settings of the AUX port, which are shown in the following t

Page 100

47 Figure 41 Connecting the AUX port to a terminal 3. If the PC is off, turn on the PC. 4. Launch the terminal emulation program and configure t

Page 101 - Configuring banners

48 Figure 43 Specifying the serial port used to establish the connection Figure 44 Setting the properties of the serial port 5. Power on the dev

Page 102 - Configuration procedure

49 Figure 45 CLI 6. At the default user view prompt <HP>, enter commands to configure the device or check the running status of the device.

Page 103 - Rebooting the device

50 Task Command Remarks Send messages to user interfaces. send { all | num1 | { aux | console | vty } num2 } Available in user view.

Page 104 - Scheduling a device reboot

51 Logging in to the Web interface The device provides a built-in Web server for you to configure the device through a Web browser. Web login is by d

Page 105 - Scheduling jobs

52 Up to five users can concurrently log in to the device through the Web interface. Figure 46 Web login page Adding a Web login account Perform th

Page 106

53 Table 10 Basic Web login configuration requirements Object Requirements Device Assign an IP address to an interface. Configure routes to make su

Page 107 - Network requirements

iv Configuring and using command keyword aliases ························································································· 354H126154

Page 108

54 Step Command Remarks 10. Specify the command level of the local user. authorization-attribute level level No command level is configured for the

Page 109

55 Step Command Remarks 3. Associate the HTTPS service with an SSL server policy. ip https ssl-server-policy policy-name Optional. By default, the H

Page 110

56 Step Command Remarks 7. Associate the HTTPS service with an ACL. ip https acl acl-number By default, the HTTPS service is not associated with any

Page 111

57 Displaying and maintaining Web login Task Command Remarks Display information about Web users. display web users [ | { begin | exclude | incl

Page 112

58 2. Verify the configuration: # On the PC, launch a Web browser and enter the IP address of the interface in the address bar. The Web login page a

Page 113 - Reference

59 # Create a PKI domain, specify the trusted CA as new-ca, the URL of the server for certificate request as http://10.1.2.2/certsrv/mscep/mscep.dll,

Page 114 - Remarks

60 On the host, run the IE browser, and then enter http://10.1.2.2/certsrv in the address bar and request a certificate for the host as prompted. 3.

Page 115

61 Figure 50 Internet Explorer setting (I) 3. Click Custom Level. The dialog box Security Settings appears. 4. Enable Run ActiveX controls and pl

Page 116 - Managing users

62 Figure 51 Internet Explorer setting (II) 5. Click OK in the Security Settings dialog box. Configuring Firefox Web browser settings 1. Open the

Page 117

63 Figure 52 Firefox Web browser setting

Page 118 - Configuration example

1 Overview This documentation is applicable to the following firewall and UTM products: • HP F1000-S-EI firewall (hereinafter referred to as the F100

Page 119 - Controlling user logins

64 Accessing the device through SNMP NOTE: Accessing the device through SNMP is not supported in FIPS mode. You can run SNMP on an NMS to access

Page 120

65 Step Command Remarks 2. Enable the SNMP agent. snmp-agent Optional. By default, the SNMP agent is disabled. You can enable SNMP agent with this c

Page 121

66 Step Command Remarks 4. Configure the SNMP access right. • (Approach 1) Specify the SNMP NMS access right directly by configuring an SNMP commun

Page 122

67 2. Configure the NMS: Make sure the NMS has the same SNMP settings, including the username as the firewall. If not, the firewall cannot be discov

Page 123

68 Logging in to the firewall module from the network device Feature and hardware compatibility Hardware Feature compatible F1000-A-EI/F1000-S-EI No

Page 124

69 After login, the terminal screen displays the CLI of the firewall module. To return to the CLI on the device, press Ctrl+K. Monitoring and managin

Page 125 - Logging off online Web users

70 An ACSEI server can register multiple ACSEI clients. ACSEI timers An ACSEI server uses two timers, the clock synchronization timer and the monito

Page 126 - Displaying online users

71 Configuring ACSEI client on the firewall module Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view interface in

Page 127 - Using the CLI

72 Figure 55 Network diagram Configuration procedure This example uses a switch. The configuration on a router is the same. 1. Log in to the firew

Page 128 - CLI views

73 # acsei server acsei timer clock-sync 10 acsei timer monitor 10 # return [Switch] The output shows that the clock synchronization timer and m

Page 129 - Return to user view. return

2 Figure 1 Front view 1: Combo interfaces 2: Console port (CONSOLE) 3: USB port (reserved for future use) Figure 2 Rear view 1: Power module slo

Page 130

74 Basic configuration Overview Basic configuration information include: • Device name and login password—Modify the system name and the password of

Page 131 - Entering a command

75 Figure 56 Basic configuration wizard—1/6 3. Click Next. The page for basic configuration appears.

Page 132 - Usage guidelines

76 Figure 57 Basic configuration wizard—2/6 (basic information) 4. Configure the parameters as described in Table 11. Table 11 Configuration item

Page 133

77 Figure 58 Basic configuration wizard—3/6 (service management) 6. Configure the parameters as described in Table 12. Table 12 Configuration item

Page 134

78 Item Description HTTPS Specify whether to enable HTTPS on the device, and set the HTTPS port number. Disabled by default. IMPORTANT: • If the cu

Page 135 - Controlling the CLI output

79 Table 13 Configuration items Item Description IP Configuration Set the approach for obtaining the IP address, including: • None—The IP address of

Page 136

80 Table 14 Configuration items Item Description Interface Select an interface on which the NAT configuration will be applied. Dynamic NAT Specify w

Page 137

81 Figure 61 Basic configuration wizard—6/6 On this page, you can set whether to save the current configuration to the startup configuration file (

Page 138

82 Step Command Remarks 4. Configure NAT. • To configure a static NAT mapping: a. nat static local-ip [ vpn-instance local-name ] global-ip [ vp

Page 139

83 Step Command Remarks 9. Add the interface to the security zone. import interface interface-type interface-number [ vlan vlan-list ] By default, G

Page 140

3 • Support for management by its own Web-based management system or by IMC The F1000-E uses a multi-core processor and provides the following interf

Page 141

84 Managing the device Device management includes monitoring the operating status of devices and configuring their running parameters. The configurat

Page 142

85 To configure the device name: Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the device name. sysname sysname The d

Page 143

86 Figure 64 Calendar page 3. Modify the system time either in the System Time Configuration text box, or through the calendar page. You can perfo

Page 144

87 Table 15 Configuration items Item Description Clock status Displays the synchronization status of the system clock. Local Reference Source Set th

Page 145

88 Figure 66 Setting the time zone 3. Configure the time zone and daylight saving time as described in Table 16. 4. Click Apply. Table 16 Configu

Page 146 - Support and other resources

89 Figure 68 Network diagram Configuration procedure 1. On Device A, configure the local clock as the reference clock, with the stratum 2: a. Sel

Page 147 - Conventions

90 Figure 70 Configuring Device A as the NTP server of Device B 3. Verifying the configuration After the configuration, you can see that the curre

Page 148 - Port numbering in examples

91 Configuration guidelines You can change the system time by configuring the relative time, time zone, and daylight saving time. The configuration r

Page 149

92 Command Effective system time Configuration example System time 1, 3 date-time outside the daylight saving time range: date-time clock datetime 1

Page 150

93 Command Effective system time Configuration example System time 1, 2, 3 or 1, 3, 2 date-time ± zone-offset outside the daylight saving time range:

Commentaires sur ces manuels

Pas de commentaire