HP X Unified Security Platform Series Bedienungsanleitung Seite 37

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 333
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 36
Security Profiles
X Family LSM User’s Guide V 2.5.1 21
For additional information, see the following topics:
Create a Security Profile” on page 21
Edit a Security Profile” on page 22
View DV Filters” on page 26
Edit DV Filter Category Settings” on page 29
Create a Security Profile
STEP 1
On the LSM menu, select IPS > Security Profiles. Then, click the Create Security Profile
button.
STEP 2
On the Create Security Profiles page, click the (edit) icon to edit the desired security pro-
file.
STEP 3
In the Security Zones section, specify the security zone pairs for the Security Profile:
STEP A
Select the Incoming and Outgoing Security Zone.
STEP B
Click Add to table.
Repeat this process until you have added all the required security zone pairs.
STEP 4
Review or configure advanced configuration options. If the advanced options are not visible,
click Show Advanced Options. In the Profile Details (Advanced) section in the Category
Security Zones: This section lists all the security zone pairs that are currently protected by a
Security Profile.
Note If a Traffic Threshold has been configured with a Security Zone pair that is not
protected by a Security Profile, the pair will be listed in the table in red along with the
following message:
No security profile is assigned to the security zones. Traffic
will NOT be inspected by the IPS
.
To correct the error, add the security zone pair to an existing Security Profile, or create a
new Profile to protect it.
Incoming The Security Zone that is the traffic source
Outgoing The Security Zone that is the traffic destination
Security Profile The name of the Security Zone configured on the device
Table 3–2: Security Profile Details (Continued)
Parameter Description
Note For additional information about setting up the Security
Zones, see
Security Zone Configuration on page 135.
Seitenansicht 36
1 2 ... 32 33 34 35 36 37 38 39 40 41 42 ... 332 333

Kommentare zu diesen Handbüchern

Keine Kommentare