i
Contents
Overview ······································································································································································ 1
Introduction to HP A-IMC Firewall Manager··················································································································1
What HP A-IMC Firewall Manager can do ···················································································································1
Installation and uninstallation······································································································································ 2
Installing the firewall manager ········································································································································2
Registering the firewall manager·····································································································································2
Uninstalling the firewall manager ···································································································································3
System management···················································································································································· 4
Device management ·························································································································································4
Managing devices····················································································································································4
Managing batch import········································································································································ 18
Managing device groups ····································································································································· 18
Managing events··················································································································································· 20
Managing device access templates ···················································································································· 22
Managing the device software database··········································································································· 24
Managing deployment tasks ································································································································ 26
Operator management·················································································································································· 27
Managing operators············································································································································· 27
Managing operation logs····································································································································· 29
Changing your login password ··························································································································· 30
System configuration······················································································································································ 31
Configuring system parameter····························································································································· 31
Configuring management ports··························································································································· 31
Configuring the mail server·································································································································· 32
Managing filters ···················································································································································· 33
Managing LDAP servers ······································································································································· 35
Managing log retention time································································································································ 37
Monitoring the disk space ···································································································································· 37
Managing subsystems··········································································································································· 39
Firewall management ················································································································································42
Attack events monitoring ··············································································································································· 42
Snapshot of events ················································································································································ 42
Recent events list···················································································································································· 44
Device monitoring ················································································································································· 45
Event analysis ································································································································································· 45
Event overview······················································································································································· 45
Event details ··························································································································································· 47
Report exporting management····························································································································· 49
Event auditing································································································································································· 51
Inter-zone access log auditing ····························································································································· 52
Abnormal traffic log auditing······························································································································· 52
Blacklist log auditing············································································································································· 53
Operation log auditing········································································································································· 53
Other log auditing················································································································································· 54
NAT log auditing··················································································································································· 55
MPLS log auditing ················································································································································· 55
Security policy management········································································································································· 56