Overview ······································································································································································ 1
Introduction to HP
Installation and uninstallation······································································································································ 2
Installing the firewall manager ········································································································································2
Registering the firewall manager·····································································································································2 Uninstalling the firewall manager ···································································································································3
System management···················································································································································· 4
Device management ·························································································································································4
Managing devices····················································································································································4 Managing batch import········································································································································ 18 Managing device groups ····································································································································· 18 Managing events··················································································································································· 20 Managing device access templates ···················································································································· 22 Managing the device software database··········································································································· 24 Managing deployment tasks································································································································ 26
Operator management·················································································································································· 27 Managing operators············································································································································· 27 Managing operation logs····································································································································· 29 Changing your login password ··························································································································· 30 System configuration······················································································································································ 31 Configuring system parameter····························································································································· 31 Configuring management ports ··························································································································· 31 Configuring the mail server·································································································································· 32 Managing filters ···················································································································································· 33 Managing LDAP servers ······································································································································· 35 Managing log retention time································································································································ 37 Monitoring the disk space···································································································································· 37 Managing subsystems··········································································································································· 39
Firewall management ················································································································································42
Attack events monitoring ··············································································································································· 42 Snapshot of events ················································································································································ 42 Recent events list···················································································································································· 44 Device monitoring ················································································································································· 45 Event analysis ································································································································································· 45 Event overview······················································································································································· 45 Event details ··························································································································································· 47 Report exporting management····························································································································· 49 Event auditing································································································································································· 51
i