Manuals
/
HP
/
Computer Equipment
/
Network Hardware
HP
200 Unified Threat Management (UTM) Appliance
manual
Connection description
Models:
200 Unified Threat Management (UTM) Appliance
1
27
150
150
Download
150 pages
16.75 Kb
24
25
26
27
28
29
30
31
<
>
Troubleshooting
Error codes
AUX login diagram
Password
Parameter Default
Acsei timers
Symbols
Login
Maintenance
Configuration guidelines
Page 27
Image 27
Figure 26 Connection description
Figure 27 Specifying the serial port used to establish the connection
21
Page 26
Page 28
Page 27
Image 27
Page 26
Page 28
Contents
HP Firewalls and UTM Devices
Page
Contents
Page
Iii
Page
Appearance
Overview
F1000-A-EI/F1000-S-EI
Overview
Front view
F1000-E
F5000
Aspf
Firewall modules
Enhanced firewall modules
Firewall module for 5800 switches
UTM products
U200-A front view
U200-A
Firewall application
Application scenarios
F1000-A-EI/F1000-S-EI
U200-S
VPN application
Virtual firewall application
F1000-E
Firewall modules
F5000
Clound computing data center application
Enhanced firewall modules
Enterprise network applicatoin
Remote access application
UTM
Network diagram
Login method Default setting and configuration requirements
Login overview
Login methods at a glance
Login methods
User interface assignment
CLI login method and user interface matrix
User interface Login method
CLI user interfaces
Page
Logging in through the console port for the first time
Default console port properties
Parameter Default
Logging in to the CLI
Connection description
Setting the properties of the serial port
Configuring console login control settings
Last-number
Configuring none authentication for console login
Authentication Configuration tasks Reference Mode
Command Remarks
Configuring scheme authentication for console login
Configuring password authentication for console login
Hwtacacs-scheme-name
Configuration Guide
Password
Domain domain-name
Speed speed-value
Configuring common console user interface settings optional
Logging in through Telnet
Telnet login
Device role Requirements
Telnet server and Telnet client configuration requirements
Configuring none authentication for Telnet login
Telnetting to the device without authentication
Configuring password authentication for Telnet login
Password authentication interface for Telnet login
Configuring scheme authentication for Telnet login
User only depend on the user
Step Command Remarks
Configuring common VTY user interface settings optional
Value
Using the device to log in to a Telnet server
Command
Character
To use the device to log in to a Telnet server
Logging in through SSH
SSH server and client requirements
Configuring the SSH server on the device
Ldap-scheme-name
Ssh2 server
Local login through the AUX port
Using the device to log in to an SSH server
Started Command Reference
AUX login diagram
Hardware Feature compatible
Configuring none authentication for AUX login
Configuring password authentication for AUX login
Password authentication interface for AUX login
Configuring scheme authentication for AUX login
Apply the specified AAA
Ip alias ip-address port-number
Configuring common settings for AUX login optional
Display type of both the device
Default AUX port properties
Login procedure
Connecting the AUX port to a terminal
Power on the device and press Enter at the prompt
Regular-expression
Displaying and maintaining CLI login
Task Command Remarks
Include regular-expression
Send all num1 aux console Available in user view Vty num2
Configuration guidelines
Logging in by using the default Web login settings
Logging in to the Web interface
Configuring Web login
Adding a Web login account
Web captcha verification-code
Configuring Http login
Basic Web login configuration requirements
Object Requirements
Configuring Https login
Interface interface-type Interface-number
Verification-code
Policy-name
VPN Configuration Guide
Mask mask-length
Https
Network requirements
Displaying and maintaining Web login
Http login configuration example
Configuration procedure
Https login configuration example
# Create RSA local key pairs
# Associate the Https service with SSL server policy myssl
# Enable the Https service
Configure the host Https client
Configuring the Internet Explorer settings
Troubleshooting Web browser
Failure to access the device through the Web interface
Symptom
Internet Explorer setting
Click OK in the Security Settings dialog box
Configuring Firefox Web browser settings
Firefox Web browser setting
Prerequisites
Accessing the device through Snmp
Configuring Snmp access
Configuring SNMPv3 access
Notify-view acl acl-number acl
Configuring SNMPv1 or SNMPv2c access
Ipv6 ipv6-acl-number See Getting Started Command Reference
Priv-password acl acl-number acl ipv6 ipv6-acl-number
# Configure an Snmp group
Snmp login example
StepCommand Remarks
# Enable the Snmp agent
Page
Feature and hardware compatibility
Logging in to the firewall module from the network device
Logging in to the firewall module from the network device
Configuring the Acsei protocol
Resetting the system of the firewall module
Acsei startup and running
Acsei timers
Configuring Acsei server on the network device
Acsei starts up and runs in the following procedures
Client-id
Configuring Acsei client on the firewall module
Displaying and maintaining Acsei server and client
Network requirements
# Log in to the firewall module
Configuration procedure
# Set the clock synchronization timer to 10 minutes
# Set the monitoring timer to 10 seconds
Page
Basic configuration
Performing basic configuration in the Web interface
Overview
Click Next For basic configuration appears
Basic configuration wizard-1/6
Click Next For configuring service management appears
Basic configuration wizard-2/6 basic information
Basic configuration wizard-3/6 service management
Assign IP addresses to the interfaces
Another service
Configuration items
Click Next For configuring NAT appears
Configure the parameters as described in Table
IP/Wildcard
Basic configuration wizard-6/6
Performing basic configuration at the CLI
Zone name zone-name id zone-id
Global-name
Interface interface-type
Ip address ip-address mask-length mask
Configuration
Hardware Supported storage medium
Configuring the device name in the Web interface
Configuring the device name at the CLI
Managing the device
Configuring the system time in the Web interface
Configuring the system time
Displaying the current system time
Calendar
Configuring the network time
Source Interface
Configuring the time zone and daylight saving time
This example, Device a is the firewall
Date and time configuration example
Configuring the local clock as the reference clock
Configuration guidelines
Configuring the system time at the CLI
Date-time ± zone-offset
System time configuration results
Date-time
Zone-offset
Zone-offset +
Both date-time
To change the system time
Date-time ± zone-offset +
Summer-offset
Setting the idle timeout timer in the Web interface
Setting the idle timeout timer at the CLI
To set the idle timeout timer
Banner message input modes
Configuring banners
To enable displaying the copyright statement
Enabling displaying the copyright statement
To configure banners
Configuring the maximum number of concurrent users
Configuring the exception handling method
Rebooting the device
Rebooting the firewall in the Web interface
Rebooting the firewall at the CLI
Rebooting devices immediately at the CLI
Scheduling a device reboot
Job configuration approaches
Scheduling jobs
Comparison of non-modular and modular approaches
View view-name
Scheduling a job in the non-modular approach
Scheduling a job in the modular approach
Job job-name
Scheduled job configuration example
Time time-id at time date command command
# Create a job named pc1, and enter its view
# Display information about scheduled jobs
Setting the port status detection timer
# Create a job named pc2, and enter its view
# Create a job named pc3, and enter its view
To set the port status detection timer
Configuring temperature thresholds for a device or a module
Configuring basic temperature thresholds
Configuring advanced temperature thresholds
Monitoring an NMS-connected interface
Clearing unused 16-bit interface indexes
Interface-number begin
Verifying and diagnosing transceiver modules
Verifying transceiver modules
Diagnosing transceiver modules
Command Reference
Displaying and maintaining device management
See Getting Started
Task Command Remarks
Task Command Remarks
Configuring a local user in the Web interface
Managing users
User levels
Click Add
Configure a local user, as described in Table Click Apply
Configuration example
Service type feature and hardware compatibility
Item Description
Configuring a local user at the CLI
Controlling user logins
Configuring Telnet login control
Ipv6-address prefix-length
Configuring source IP-based Telnet login control
Source sour-addr sour-wildcard
Vpn-instancevpn-instance-name
Telnet login control configuration example
Configuring source MAC-based Telnet login control
Rule-string
Getting Started
Configuring source IP-based Snmp login control
Group-name acl acl-number acl ipv6
Snmp login control configuration example
Ipv6 ipv6-acl-number
Read-view write-viewwrite-view
Configuring source IP-based Web login control
Configuring Web login control
User-id user-nameuser-name
Web login control configuration example
Logging off online Web users
Source sour-addr sour-wildcard N/A any time-range
Field Description
Displaying online users
Convention Description
Using the CLI
Command conventions
Command conventions
CLI views
Using the undo form of a command
Returning to user view from any other view
Task Command
Entering system view from user view
Returning to the upper-level view from any view
Accessing the CLI online help
Command line editing keys
Entering a command
Editing a command line
Abbreviating commands
Usage guidelines
Configuring and using command keyword aliases
Configuring and using hotkeys
To configure a command keyword alias
Enabling redisplaying entered-but-not-submitted commands
System-reserved hotkeys
Hotkey Function
Error message Cause
Understanding command-line error messages
Using the command history function
Common command-line error messages
Controlling the CLI output
Viewing history commands
Setting the command history buffer size for user interfaces
Pausing between screens of output
Filtering the output from a display command
Special characters supported in a regular expression
Character Meaning Examples
Matches character1character2
Contain stringstring. string1string2\2 repeats
String1string2string2. string1string2\1\2
String1string2string1string2
A being character2, but does not match 2a
Configuring user privilege and command levels
Configuring a user privilege level
Command levels and user privilege levels
Level Privilege Default set of commands
Last-num1 vty first-num2 Last-num2
Management and Maintenance
By default, the user privilege level
Switching the user privilege level
Privilege level switching authentication modes
Authentication mode Keywords Description
Information, see Access Control Configuration Guide
Information required for user privilege level switching
Switching to a higher user privilege level
View command
Saving the running configuration
Changing the level of a command
To change the level of a command
Support and other resources
Contacting HP
Related information
GUI conventions
Command conventions
Symbols
Conventions
Port numbering in examples
Network topology icons
Index
144
Top
Page
Image
Contents