HP Firewall Series Manuel d'utilisateur Page 1

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel HP Firewall Series. HP Firewall Series User's Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 119
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - HP A-IMC Firewall Manager

HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805

Page 2

6 Return to Device management functions. 3. Adding a device From the navigation tree of the system management component, select Device List under De

Page 3 - Contents

96 SSL VPN log auditing The SSL VPN log auditing function allows you to audit user access records, operation logs, resource accesses, and authenticat

Page 4

97 Figure 103 Operation log auditing Resource access auditing The resource access auditing allows you to audit operations of SSL VPN users based on

Page 5 - Overview

98 Figure 105 Authentication failure auditing

Page 6

99 Configuration example 1 Network requirements The HP A-IMC Firewall Manager works with HP firewall devices. The Firewall Manager collects attack ev

Page 7

100 2. Select the Firewall Management component, and then select Device Management under Device Management from the navigation tree to enter the dev

Page 8 - System management

101 Configuration example 2 Network requirements The FW device connects the internal network 4.1.1.0/24 through GigabitEthernet 0/4 and connects the

Page 9

102 Select Firewall > ACL, configure rules for ACL 3000 to permit packets sourced from 4.1.1.0/24. Figure 111 Configure ACL 3000 3. Configure a

Page 10

103 Figure 113 Add the FW device to the Firewall Manager A-F1000-E192.168.250.214 Configuring intrusion detection in firewall and sending logs to Fi

Page 11

104 Figure 114 Configure a log host The port number should be in accordance with the management port number set in Firewall Manager, which can be s

Page 12

105 Figure 116 Userlog NOTE: At present, flow logs refer to session logs only. To generate flow logs, you need to configure session logging accor

Page 13 - Device software management

7 If you select Specify access parameters, specify the access parameters, including Web Username, Web Password, Web Port, Telnet Username, Telnet Pas

Page 14

106 • Scanning detection • Blacklist • URPF check

Page 15

107 NOTE: After configuring all the policies, please remember to click Apply to make them take effect. Verification Firewall logs and Firewall M

Page 16 - Device config management

108 • Intrusion Policy Log • User log Displaying firewall management statistics on Firewall Manager As we have configured the firewall to sen

Page 17

109 • Recent list • Inter-zone access logs

Page 18

110 • Blacklist logs • Operation Logs

Page 19

111 Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Befo

Page 20 - 6. Running Config

112 Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text

Page 21

113 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as

Page 22 - Managing device groups

114 Index A B C D E F I M N O R S T U V W A Abnormal traffic log auditing,52 Adding devices to the firewall manager,99 Authentication failure auditi

Page 23 - Adding a device group

115 User access records auditing,96 V Viewing device statistics,85 W Websites,111

Page 24 - Managing events

8 Password Required when you select the authentication protocol HMAC-MD5 or SMAC-SHA. Specify the authentication password to be used for communicatio

Page 25 - Device interface event list

9 Device software management Device software refers to the software that a firewall device runs to provide services. It can be regarded as the operat

Page 26 - Template list

10 multiple devices at a time. You can specify deployment parameters, such as the deployment sequence, policy, time, and error handling mode. A succe

Page 27 - Adding a template

11 (Parallel) or one by one (Serial). When the deployment sequence is serial, the icons are configurable for adjusting the sequence. Error Handling

Page 28

12 Table 8 Fields of the software backup result list Field Description Device Label Device name and IP address Software Name Name of the software ba

Page 29 - Importing device software

13 a device to another version. Synchronizing configurations Allows you to deploy new configuration settings to devices to make them take effect. Re

Page 30 - Managing deployment tasks

14 3. Restoring a configuration file From the navigation tree of the system management component, select Device List under Device Management. The de

Page 31 - Operator management

15 Table 11 Tabs on the device configuration information management page and functions provided Tab Description Label A label represents a configura

Page 32 - Adding an operator

Legal and notice information © Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitt

Page 33 - Managing operation logs

16 Figure 13 Compare two configuration files CAUTION: The label Currently indicates the configuration file is currently used by the device and the

Page 34 - Changing your login password

17 Table 13 Fields of the running configuration list Field Description Version Uniquely identifies the running configuration file. The version number

Page 35 - System configuration

18 Description Remarks on the draft. Creation Time Time when the draft is created. Last Modify Time Last time when the draft is modified. Compare

Page 36 - Configuring the mail server

19 Table 15 Device group management functions Function Description Device group list Allows you to view details about device groups and modify and de

Page 37 - Managing filters

20 Description Optional Type a description for the device group. The description can comprise up to 40 characters. Return to Device group management

Page 38 - Adding a filter

21 Table 20 describes the fields of the device event list. You can select the check boxes before events and then click Delete to delete the events. T

Page 39 - Managing LDAP servers

22 Managing device access templates The device access template management function allows you to configure information such as the device login passw

Page 40 - Adding an LDAP server

23 Adding a template From the navigation tree of the system management component, select Access Template List under Device Management to enter the ac

Page 41 - Monitoring the disk space

24 The strength of the password must meet the password strength requirements of the device. SNMP Version Required Select an SNMP version, which can b

Page 42

25 Figure 23 Device software database page Table 26 Device software database functions Function Description Importing device software Allows you t

Page 43 - Managing subsystems

i Contents Overview ··································································································································

Page 44 - Adding a subsystem

26 Figure 24 Device software import page Managing deployment tasks This function allows you to view all deployment task information. Configuration

Page 45

27 Creation Time Time when the deployment task is created Creator Creator of the deployment task Start Time Time when the deployment task starts E

Page 46 - Firewall management

28 Table 32 Operator management functions Function Description Operator list Allows you to view details about operators, modify operator information

Page 47

29 Table 34 Operator configuration items Item Description Login Name Type a name for the operator, a string of up to 40 characters. Login Password S

Page 48 - Recent events list

30 Table 36 Fields of the operation log list Field Description Operator Name of the operator IP Address IP address of the PC used by the operator t

Page 49 - Event analysis

31 System configuration Configuring system parameter Configure the system parameter to allow non-SNMP devices in the system. Configuration guide From

Page 50

32 Type the port for receiving NAT logs. The port number must be in the range from 1 to 65534. Syslog Port Required Type the port for receiving syslo

Page 51 - Event details

33 Type the username for identity authentication on the mail server. The password can comprise up to 80 characters. Password Optional Type the passwo

Page 52

34 Field Description Operation Click the icon of a filter to modify the settings of the filter. Return to Filter management functions. Adding a f

Page 53 - Report exporting management

35 Specify the source ports that you want the system to collect statistics on. Destination Port Optional Specify the destination ports that you want

Page 54 - Report export file list

ii Security zones·····································································································································

Page 55 - Event auditing

36 Table 44 Fields of the LDAP server list Field Description Server Name Name of the LDAP server Server IP Address IP address of the LDAP server Se

Page 56

37 Admin Password Required Type the administrator password for the LDAP server. Username Attribute Required Type a username attribute for the LDAP se

Page 57 - Operation log auditing

38 Figure 38 Disk space alarm configuration page Table 46 Alarm configuration items of the disk space for logs Item Description Warning Disk Space

Page 58 - Other log auditing

39 Figure 39 Free disk space monitoring page Managing subsystems The subsystem management allows you to manage and monitor multiple Firewall Manage

Page 59 - MPLS log auditing

40 Figure 40 Subsystem information Table 47 Fields of the subsystem list Field Description Server IP IP address of the server for the subsystem. P

Page 60 - Security policy management

41 User Name Required Type the username for logging in to the subsystem. The username can comprise up to 40 characters. Password Required Specify the

Page 61 - Adding a security zone

42 Firewall management The Firewall Manager enables centralized management of firewall devices in the network, centralized event collection and analy

Page 62 - Time ranges

43 Figure 42 Snapshot of events Table 49 Event snapshot query options Option Description Device Select a device, a device group, or All devices fro

Page 63 - Adding a time range

44 • In the Detail column of a TopN list, you can click the icon of an attack event to enter the attack event details page. For more information,

Page 64 - Services

45 Device monitoring In addition to the attack event information of the entire network, the firewall management component also allows you to view the

Page 65 - User-defined services

1 Overview Introduction to HP A-IMC Firewall Manager HP A-IMC Firewall Manager is a powerful system for comprehensive analysis and centralized manage

Page 66

46 Figure 45 Attack event overview Table 53 Query options on the attack event overview page Option Description Device Select a device, a device gro

Page 67 - Service groups

47 Figure 46 Top 10 attack events contrast graph You can click the link to export all the analysis reports that the event overview function provi

Page 68

48 Figure 47 Attack event details Table 54 Event details query options Option Description Device Select a device, a device group, or All devices fr

Page 69 - IP addresses

49 Table 55 Fields of the attack event details list Field Description Time Time when the attack event occurred Src IP Attack source IP address Dest

Page 70

50 Table 57 Fields of the report export task list Field Description Report Task Name of the report export task Creation Time Time when the task was

Page 71 - Address ranges

51 Return to Report export task management functions. Adding a report export task From the navigation tree of the firewall management component, sele

Page 72 - Subnet addresses

52 The event auditing function does not support cross-day query. If the query period spans a day or the query start time is later than the end time,

Page 73

53 Figure 52 Abnormal traffic log auditing Blacklist log auditing Configuration guide From the navigation tree of the firewall management component

Page 74 - IP address groups

54 Figure 54 Operation log auditing Other log auditing Configuration guide From the navigation tree of the firewall management component, select Ot

Page 75

55 NAT log auditing Configuration guide From the navigation tree of the firewall management component, select NAT Logs under Event Auditing to enter

Page 76 - Interzone rules

2 Installation and uninstallation Installing the firewall manager The software and hardware requirements of the Firewall Manager are as follows: • H

Page 77 - Adding an interzone rule

56 Figure 57 MPLS log auditing NOTE: If the IP address/port number is null in the database, NA will be displayed in the IP address or port field.

Page 78 - Item Description

57 Adding a security zone Allows you to add a security zone. Importing security zones from a device Allows you to import security zones from a devic

Page 79

58 Table 63 Security zone configuration item Item Description Security Zone Type a name for the security zone. A security zone name cannot contain an

Page 80 - Interzone policies

59 Deleting a time range Allows you to click the icon of a time range to delete the time range. Time range list The time range list is on the time

Page 81 - Rule management

60 and then select the days of the week during which the time period applies. By default, the periodic time period is from 0:0 to 24:0 every day. •

Page 82

61 Protocol Protocol used by the service Protocol Parameters Parameters configured for the protocol Return to Service management functions. User-d

Page 83 - Sorting interzone rules

62 Figure 65 Add a user-defined service Table 70 User-defined service configuration items Item Description Name Required Type a name for the user-d

Page 84

63 To delete user-defined services, select them and click Delete on the user-defined service management page. Return to Service management functions.

Page 85 - Applied rules list

64 Figure 67 Add a service group Table 72 Service group configuration items Item Description Name Required Type a name for the service group. Valid

Page 86

65 IP addresses Configuration guide From the navigation tree of the firewall management component, select IP Addresses under Security Policy Manageme

Page 87 - Firewall device management

3 Figure 2 Register your license After seeing the acknowledgement page, you can use the Firewall Manager to configure devices and perform other ope

Page 88 - Adding firewall devices

66 Figure 69 Add a host address Table 75 Host address configuration items Item Description Name Required Type a name for the host address. Valid ch

Page 89 - Viewing device statistics

67 Address ranges From the navigation tree of the firewall management component, select IP Addresses under Security Policy Management. Click the Addr

Page 90 - Configuration segment list

68 Table 77 Address range configuration items Item Description Name Required Type a name for the address range. Valid characters for the name: letter

Page 91

69 Subnet Subnet address and mask Excluded Addresses Addresses excluded from the subnet Description Descriptive information about the subnet addre

Page 92

70 Specify a subnet address. The IP address must be in dotted decimal notation. Wildcard Required Select a wildcard mask for the subnet address. Excl

Page 93

71 Figure 75 Add an IP address group Table 81 IP address group configuration items Item Description Name Required Type a name for the IP address gr

Page 94

72 Interzone rules Configuration guide From the navigation tree of the firewall management component, select Interzone Rules under Security Policy Ma

Page 95

73 Dest IP Query interzone rules by destination IP. Time Range Query interzone rules by time range. Policy Query interzone rules by policy. Status

Page 96 - Field Description

74 Figure 77 Add an interzone rule Table 85 Interzone rule configuration items Item Description Src Zone Required Select a source zone for the inte

Page 97 - SSL VPN auditing

75 Src IP Required Add source IP addresses for the interzone rule. • Available IP addresses are listed in the left box. The right box lists the sour

Page 98 - Daily user statistics

4 System management The system management component is mainly used to configure the firewall devices to be managed by the Firewall Manager. To access

Page 99 - Device monitoring

76 Enable this rule Optional Select this option to enable the interzone rule. By default, this option is not selected. Continue to add another rule O

Page 100 - SSL VPN log auditing

77 Table 87 Fields of the interzone policy list Filed Description Policy Name Name of the interzone policy Description Descriptive information abou

Page 101 - Resource access auditing

78 Figure 80 Rule management page Table 89 Fields of the policy’s rule list Filed Description ID ID of the interzone rule When you create an interz

Page 102

79 Figure 81 Add interzone rules to the policy Return to Interzone policy management functions. Sorting interzone rules On an interzone policy’s ru

Page 103 - Configuration example 1

80 Interzone policy applications Configuration guide From the navigation tree of the firewall management component, select Apply Interzone Policy und

Page 104

81 Application Result Application result of the interzone policy Remarks Displays the security zones that are covered by some of the policy’s rules

Page 105 - Configuration example 2

82 Figure 86 List of rules applied to a device Table 93 Applied rule list query options Option Description Src Zone Query interzone rules by sourc

Page 106

83 Policy Policies that the interzone rule is in. You can click a policy name to enter the page for managing the policy's rules. See “Rule manag

Page 107 - Firewall Manager

84 Firewall device list From the navigation tree of the firewall management component, select Device Management under Device Management. The firewall

Page 108 - 2. Configure User Log

85 Return to Firewall management functions. Viewing device statistics The device statistics function can collect statistics on devices by day, week,

Page 109

5 Figure 3 Device management page Table 1 Device management functions Function Description Device list Allows you to view details about devices, e

Page 110

86 Figure 90 Device configuration segment management page Table 99 Configuration segment management functions Function Description Configuration se

Page 111 - Verification

87 Description Detailed description of the configuration segment Operation • Click the icon of a configuration segment to rename the configuratio

Page 112

88 Table 101 Configuration segment configuration items Item Description File Type Required Select the configuration segment type, cfg or xml. Filenam

Page 113 - • Recent list

89 Deploying a configuration segment On the configuration segments list, click the icon of a configuration segment to configure a deployment task f

Page 114

90 Figure 95 Configure deployment task attributes 4. Confirm your configuration. You can click the icon in the device list to view the configur

Page 115 - Support and other resources

91 Managing deployment tasks Configuration guide From the navigation tree of the firewall management component, select Deployment Tasks under Policy

Page 116 - Conventions

92 Table 103 Fields of the deployment task list Field Description Execution Status Execution status of the task Task Name Name of the task Task Typ

Page 117 - Port numbering in examples

93 SSL VPN auditing As Virtual Private Network (VPN) is much cheaper and more flexible to use than leased lines, more and more companies are establis

Page 118

94 Online users trends The online user trend graph displays the number of online SSL VPN users during a day, week, month, or a customized period of t

Page 119

95 Figure 100 Daily user statistics NOTE: The User Count field shows the count of login times on that day. Device monitoring In addition to the

Commentaires sur ces manuels

Pas de commentaire