Page 3
Contents
Overview ······································································································································································ 1
Introduction to HP A-IMC Firewall Manager··················································································································1 What HP A-IMC Firewall Manager can do ···················································································································1
Installation and uninstallation······································································································································ 2
Installing the firewall manager ········································································································································2
Registering the firewall manager·····································································································································2 Uninstalling the firewall manager ···································································································································3
System management···················································································································································· 4
Device management ·························································································································································4
Managing devices····················································································································································4 Managing batch import········································································································································ 18 Managing device groups ····································································································································· 18 Managing events··················································································································································· 20 Managing device access templates ···················································································································· 22 Managing the device software database··········································································································· 24 Managing deployment tasks································································································································ 26
Operator management·················································································································································· 27 Managing operators············································································································································· 27 Managing operation logs····································································································································· 29 Changing your login password ··························································································································· 30 System configuration······················································································································································ 31 Configuring system parameter····························································································································· 31 Configuring management ports ··························································································································· 31 Configuring the mail server·································································································································· 32 Managing filters ···················································································································································· 33 Managing LDAP servers ······································································································································· 35 Managing log retention time································································································································ 37 Monitoring the disk space···································································································································· 37 Managing subsystems··········································································································································· 39
Firewall management ················································································································································42
Attack events monitoring ··············································································································································· 42 Snapshot of events ················································································································································ 42 Recent events list···················································································································································· 44 Device monitoring ················································································································································· 45 Event analysis ································································································································································· 45 Event overview······················································································································································· 45 Event details ··························································································································································· 47 Report exporting management····························································································································· 49 Event auditing································································································································································· 51 Inter-zone access log auditing ····························································································································· 52 Abnormal traffic log auditing······························································································································· 52 Blacklist log auditing············································································································································· 53 Operation log auditing········································································································································· 53 Other log auditing················································································································································· 54 NAT log auditing··················································································································································· 55 MPLS log auditing ················································································································································· 55 Security policy management········································································································································· 56
i