HP Firewall Series Manuale Utente

Navigare online o scaricare Manuale Utente per Software HP Firewall Series. HP Firewall Series User's Manual Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 119
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti

Sommario

Pagina 1 - HP A-IMC Firewall Manager

HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805

Pagina 2

6 Return to Device management functions. 3. Adding a device From the navigation tree of the system management component, select Device List under De

Pagina 3 - Contents

96 SSL VPN log auditing The SSL VPN log auditing function allows you to audit user access records, operation logs, resource accesses, and authenticat

Pagina 4

97 Figure 103 Operation log auditing Resource access auditing The resource access auditing allows you to audit operations of SSL VPN users based on

Pagina 5 - Overview

98 Figure 105 Authentication failure auditing

Pagina 6

99 Configuration example 1 Network requirements The HP A-IMC Firewall Manager works with HP firewall devices. The Firewall Manager collects attack ev

Pagina 7

100 2. Select the Firewall Management component, and then select Device Management under Device Management from the navigation tree to enter the dev

Pagina 8 - System management

101 Configuration example 2 Network requirements The FW device connects the internal network 4.1.1.0/24 through GigabitEthernet 0/4 and connects the

Pagina 9

102 Select Firewall > ACL, configure rules for ACL 3000 to permit packets sourced from 4.1.1.0/24. Figure 111 Configure ACL 3000 3. Configure a

Pagina 10

103 Figure 113 Add the FW device to the Firewall Manager A-F1000-E192.168.250.214 Configuring intrusion detection in firewall and sending logs to Fi

Pagina 11

104 Figure 114 Configure a log host The port number should be in accordance with the management port number set in Firewall Manager, which can be s

Pagina 12

105 Figure 116 Userlog NOTE: At present, flow logs refer to session logs only. To generate flow logs, you need to configure session logging accor

Pagina 13 - Device software management

7 If you select Specify access parameters, specify the access parameters, including Web Username, Web Password, Web Port, Telnet Username, Telnet Pas

Pagina 14

106 • Scanning detection • Blacklist • URPF check

Pagina 15

107 NOTE: After configuring all the policies, please remember to click Apply to make them take effect. Verification Firewall logs and Firewall M

Pagina 16 - Device config management

108 • Intrusion Policy Log • User log Displaying firewall management statistics on Firewall Manager As we have configured the firewall to sen

Pagina 17

109 • Recent list • Inter-zone access logs

Pagina 18

110 • Blacklist logs • Operation Logs

Pagina 19

111 Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Befo

Pagina 20 - 6. Running Config

112 Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text

Pagina 21

113 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as

Pagina 22 - Managing device groups

114 Index A B C D E F I M N O R S T U V W A Abnormal traffic log auditing,52 Adding devices to the firewall manager,99 Authentication failure auditi

Pagina 23 - Adding a device group

115 User access records auditing,96 V Viewing device statistics,85 W Websites,111

Pagina 24 - Managing events

8 Password Required when you select the authentication protocol HMAC-MD5 or SMAC-SHA. Specify the authentication password to be used for communicatio

Pagina 25 - Device interface event list

9 Device software management Device software refers to the software that a firewall device runs to provide services. It can be regarded as the operat

Pagina 26 - Template list

10 multiple devices at a time. You can specify deployment parameters, such as the deployment sequence, policy, time, and error handling mode. A succe

Pagina 27 - Adding a template

11 (Parallel) or one by one (Serial). When the deployment sequence is serial, the icons are configurable for adjusting the sequence. Error Handling

Pagina 28

12 Table 8 Fields of the software backup result list Field Description Device Label Device name and IP address Software Name Name of the software ba

Pagina 29 - Importing device software

13 a device to another version. Synchronizing configurations Allows you to deploy new configuration settings to devices to make them take effect. Re

Pagina 30 - Managing deployment tasks

14 3. Restoring a configuration file From the navigation tree of the system management component, select Device List under Device Management. The de

Pagina 31 - Operator management

15 Table 11 Tabs on the device configuration information management page and functions provided Tab Description Label A label represents a configura

Pagina 32 - Adding an operator

Legal and notice information © Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitt

Pagina 33 - Managing operation logs

16 Figure 13 Compare two configuration files CAUTION: The label Currently indicates the configuration file is currently used by the device and the

Pagina 34 - Changing your login password

17 Table 13 Fields of the running configuration list Field Description Version Uniquely identifies the running configuration file. The version number

Pagina 35 - System configuration

18 Description Remarks on the draft. Creation Time Time when the draft is created. Last Modify Time Last time when the draft is modified. Compare

Pagina 36 - Configuring the mail server

19 Table 15 Device group management functions Function Description Device group list Allows you to view details about device groups and modify and de

Pagina 37 - Managing filters

20 Description Optional Type a description for the device group. The description can comprise up to 40 characters. Return to Device group management

Pagina 38 - Adding a filter

21 Table 20 describes the fields of the device event list. You can select the check boxes before events and then click Delete to delete the events. T

Pagina 39 - Managing LDAP servers

22 Managing device access templates The device access template management function allows you to configure information such as the device login passw

Pagina 40 - Adding an LDAP server

23 Adding a template From the navigation tree of the system management component, select Access Template List under Device Management to enter the ac

Pagina 41 - Monitoring the disk space

24 The strength of the password must meet the password strength requirements of the device. SNMP Version Required Select an SNMP version, which can b

Pagina 42

25 Figure 23 Device software database page Table 26 Device software database functions Function Description Importing device software Allows you t

Pagina 43 - Managing subsystems

i Contents Overview ··································································································································

Pagina 44 - Adding a subsystem

26 Figure 24 Device software import page Managing deployment tasks This function allows you to view all deployment task information. Configuration

Pagina 45

27 Creation Time Time when the deployment task is created Creator Creator of the deployment task Start Time Time when the deployment task starts E

Pagina 46 - Firewall management

28 Table 32 Operator management functions Function Description Operator list Allows you to view details about operators, modify operator information

Pagina 47

29 Table 34 Operator configuration items Item Description Login Name Type a name for the operator, a string of up to 40 characters. Login Password S

Pagina 48 - Recent events list

30 Table 36 Fields of the operation log list Field Description Operator Name of the operator IP Address IP address of the PC used by the operator t

Pagina 49 - Event analysis

31 System configuration Configuring system parameter Configure the system parameter to allow non-SNMP devices in the system. Configuration guide From

Pagina 50

32 Type the port for receiving NAT logs. The port number must be in the range from 1 to 65534. Syslog Port Required Type the port for receiving syslo

Pagina 51 - Event details

33 Type the username for identity authentication on the mail server. The password can comprise up to 80 characters. Password Optional Type the passwo

Pagina 52

34 Field Description Operation Click the icon of a filter to modify the settings of the filter. Return to Filter management functions. Adding a f

Pagina 53 - Report exporting management

35 Specify the source ports that you want the system to collect statistics on. Destination Port Optional Specify the destination ports that you want

Pagina 54 - Report export file list

ii Security zones·····································································································································

Pagina 55 - Event auditing

36 Table 44 Fields of the LDAP server list Field Description Server Name Name of the LDAP server Server IP Address IP address of the LDAP server Se

Pagina 56

37 Admin Password Required Type the administrator password for the LDAP server. Username Attribute Required Type a username attribute for the LDAP se

Pagina 57 - Operation log auditing

38 Figure 38 Disk space alarm configuration page Table 46 Alarm configuration items of the disk space for logs Item Description Warning Disk Space

Pagina 58 - Other log auditing

39 Figure 39 Free disk space monitoring page Managing subsystems The subsystem management allows you to manage and monitor multiple Firewall Manage

Pagina 59 - MPLS log auditing

40 Figure 40 Subsystem information Table 47 Fields of the subsystem list Field Description Server IP IP address of the server for the subsystem. P

Pagina 60 - Security policy management

41 User Name Required Type the username for logging in to the subsystem. The username can comprise up to 40 characters. Password Required Specify the

Pagina 61 - Adding a security zone

42 Firewall management The Firewall Manager enables centralized management of firewall devices in the network, centralized event collection and analy

Pagina 62 - Time ranges

43 Figure 42 Snapshot of events Table 49 Event snapshot query options Option Description Device Select a device, a device group, or All devices fro

Pagina 63 - Adding a time range

44 • In the Detail column of a TopN list, you can click the icon of an attack event to enter the attack event details page. For more information,

Pagina 64 - Services

45 Device monitoring In addition to the attack event information of the entire network, the firewall management component also allows you to view the

Pagina 65 - User-defined services

1 Overview Introduction to HP A-IMC Firewall Manager HP A-IMC Firewall Manager is a powerful system for comprehensive analysis and centralized manage

Pagina 66

46 Figure 45 Attack event overview Table 53 Query options on the attack event overview page Option Description Device Select a device, a device gro

Pagina 67 - Service groups

47 Figure 46 Top 10 attack events contrast graph You can click the link to export all the analysis reports that the event overview function provi

Pagina 68

48 Figure 47 Attack event details Table 54 Event details query options Option Description Device Select a device, a device group, or All devices fr

Pagina 69 - IP addresses

49 Table 55 Fields of the attack event details list Field Description Time Time when the attack event occurred Src IP Attack source IP address Dest

Pagina 70

50 Table 57 Fields of the report export task list Field Description Report Task Name of the report export task Creation Time Time when the task was

Pagina 71 - Address ranges

51 Return to Report export task management functions. Adding a report export task From the navigation tree of the firewall management component, sele

Pagina 72 - Subnet addresses

52 The event auditing function does not support cross-day query. If the query period spans a day or the query start time is later than the end time,

Pagina 73

53 Figure 52 Abnormal traffic log auditing Blacklist log auditing Configuration guide From the navigation tree of the firewall management component

Pagina 74 - IP address groups

54 Figure 54 Operation log auditing Other log auditing Configuration guide From the navigation tree of the firewall management component, select Ot

Pagina 75

55 NAT log auditing Configuration guide From the navigation tree of the firewall management component, select NAT Logs under Event Auditing to enter

Pagina 76 - Interzone rules

2 Installation and uninstallation Installing the firewall manager The software and hardware requirements of the Firewall Manager are as follows: • H

Pagina 77 - Adding an interzone rule

56 Figure 57 MPLS log auditing NOTE: If the IP address/port number is null in the database, NA will be displayed in the IP address or port field.

Pagina 78 - Item Description

57 Adding a security zone Allows you to add a security zone. Importing security zones from a device Allows you to import security zones from a devic

Pagina 79

58 Table 63 Security zone configuration item Item Description Security Zone Type a name for the security zone. A security zone name cannot contain an

Pagina 80 - Interzone policies

59 Deleting a time range Allows you to click the icon of a time range to delete the time range. Time range list The time range list is on the time

Pagina 81 - Rule management

60 and then select the days of the week during which the time period applies. By default, the periodic time period is from 0:0 to 24:0 every day. •

Pagina 82

61 Protocol Protocol used by the service Protocol Parameters Parameters configured for the protocol Return to Service management functions. User-d

Pagina 83 - Sorting interzone rules

62 Figure 65 Add a user-defined service Table 70 User-defined service configuration items Item Description Name Required Type a name for the user-d

Pagina 84

63 To delete user-defined services, select them and click Delete on the user-defined service management page. Return to Service management functions.

Pagina 85 - Applied rules list

64 Figure 67 Add a service group Table 72 Service group configuration items Item Description Name Required Type a name for the service group. Valid

Pagina 86

65 IP addresses Configuration guide From the navigation tree of the firewall management component, select IP Addresses under Security Policy Manageme

Pagina 87 - Firewall device management

3 Figure 2 Register your license After seeing the acknowledgement page, you can use the Firewall Manager to configure devices and perform other ope

Pagina 88 - Adding firewall devices

66 Figure 69 Add a host address Table 75 Host address configuration items Item Description Name Required Type a name for the host address. Valid ch

Pagina 89 - Viewing device statistics

67 Address ranges From the navigation tree of the firewall management component, select IP Addresses under Security Policy Management. Click the Addr

Pagina 90 - Configuration segment list

68 Table 77 Address range configuration items Item Description Name Required Type a name for the address range. Valid characters for the name: letter

Pagina 91

69 Subnet Subnet address and mask Excluded Addresses Addresses excluded from the subnet Description Descriptive information about the subnet addre

Pagina 92

70 Specify a subnet address. The IP address must be in dotted decimal notation. Wildcard Required Select a wildcard mask for the subnet address. Excl

Pagina 93

71 Figure 75 Add an IP address group Table 81 IP address group configuration items Item Description Name Required Type a name for the IP address gr

Pagina 94

72 Interzone rules Configuration guide From the navigation tree of the firewall management component, select Interzone Rules under Security Policy Ma

Pagina 95

73 Dest IP Query interzone rules by destination IP. Time Range Query interzone rules by time range. Policy Query interzone rules by policy. Status

Pagina 96 - Field Description

74 Figure 77 Add an interzone rule Table 85 Interzone rule configuration items Item Description Src Zone Required Select a source zone for the inte

Pagina 97 - SSL VPN auditing

75 Src IP Required Add source IP addresses for the interzone rule. • Available IP addresses are listed in the left box. The right box lists the sour

Pagina 98 - Daily user statistics

4 System management The system management component is mainly used to configure the firewall devices to be managed by the Firewall Manager. To access

Pagina 99 - Device monitoring

76 Enable this rule Optional Select this option to enable the interzone rule. By default, this option is not selected. Continue to add another rule O

Pagina 100 - SSL VPN log auditing

77 Table 87 Fields of the interzone policy list Filed Description Policy Name Name of the interzone policy Description Descriptive information abou

Pagina 101 - Resource access auditing

78 Figure 80 Rule management page Table 89 Fields of the policy’s rule list Filed Description ID ID of the interzone rule When you create an interz

Pagina 102

79 Figure 81 Add interzone rules to the policy Return to Interzone policy management functions. Sorting interzone rules On an interzone policy’s ru

Pagina 103 - Configuration example 1

80 Interzone policy applications Configuration guide From the navigation tree of the firewall management component, select Apply Interzone Policy und

Pagina 104

81 Application Result Application result of the interzone policy Remarks Displays the security zones that are covered by some of the policy’s rules

Pagina 105 - Configuration example 2

82 Figure 86 List of rules applied to a device Table 93 Applied rule list query options Option Description Src Zone Query interzone rules by sourc

Pagina 106

83 Policy Policies that the interzone rule is in. You can click a policy name to enter the page for managing the policy's rules. See “Rule manag

Pagina 107 - Firewall Manager

84 Firewall device list From the navigation tree of the firewall management component, select Device Management under Device Management. The firewall

Pagina 108 - 2. Configure User Log

85 Return to Firewall management functions. Viewing device statistics The device statistics function can collect statistics on devices by day, week,

Pagina 109

5 Figure 3 Device management page Table 1 Device management functions Function Description Device list Allows you to view details about devices, e

Pagina 110

86 Figure 90 Device configuration segment management page Table 99 Configuration segment management functions Function Description Configuration se

Pagina 111 - Verification

87 Description Detailed description of the configuration segment Operation • Click the icon of a configuration segment to rename the configuratio

Pagina 112

88 Table 101 Configuration segment configuration items Item Description File Type Required Select the configuration segment type, cfg or xml. Filenam

Pagina 113 - • Recent list

89 Deploying a configuration segment On the configuration segments list, click the icon of a configuration segment to configure a deployment task f

Pagina 114

90 Figure 95 Configure deployment task attributes 4. Confirm your configuration. You can click the icon in the device list to view the configur

Pagina 115 - Support and other resources

91 Managing deployment tasks Configuration guide From the navigation tree of the firewall management component, select Deployment Tasks under Policy

Pagina 116 - Conventions

92 Table 103 Fields of the deployment task list Field Description Execution Status Execution status of the task Task Name Name of the task Task Typ

Pagina 117 - Port numbering in examples

93 SSL VPN auditing As Virtual Private Network (VPN) is much cheaper and more flexible to use than leased lines, more and more companies are establis

Pagina 118

94 Online users trends The online user trend graph displays the number of online SSL VPN users during a day, week, month, or a customized period of t

Pagina 119

95 Figure 100 Daily user statistics NOTE: The User Count field shows the count of login times on that day. Device monitoring In addition to the

Commenti su questo manuale

Nessun commento