H3c-technologies H3C SecPath F1000-E Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Sécurité H3c-technologies H3C SecPath F1000-E. H3C Technologies H3C SecPath F1000-E User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 234
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Configuration Guide

H3C SecPath Series High-End FirewallsSystem Management and MaintenanceConfiguration Guide Hangzhou H3C Technologies Co., Ltd. ht

Page 2

v SNMPv3 configuration example························································································································

Page 3 - Preface

89 Session logs are output in the format of user logs. To view session logs, you also need to configure user logging. Session logging configuration t

Page 4 - Port numbering in examples

90 Table 15 Configuration items Item Description Source Zone Specify the source zone and destination zone. You can configure an optional security zo

Page 5 - Documentation feedback

91 Displaying system logs Select Log Report > Report > System Log from the navigation tree to enter the page as shown in Figure 36. Figure 36 O

Page 6 - Contents

92 Severity level Description Value Note: A smaller value represents a higher severity level. Displaying connection limit logs Select Log Report &

Page 7

93 Displaying attack prevention logs Select Log Report > Report > Attack Prevention Log from the navigation tree to enter the page as shown in

Page 8

94 Figure 39 Blacklist log configuration page Table 21 Field description Item Description Time/Date Time when a blacklist member is generated. Mod

Page 9

95 Field Description Policy ID ID of the interzone policy that a flow match. Action Action taken against a flow, permitted or denied. Protocol Type

Page 10

96 Figure 42 User logging 3.0 log report Table 23 User logging 1.0 field description Item Description Time/Date Time and date when a user log was

Page 11

97 Item Description Flow Information Flow information: • If the protocol type is TCP or UDP, the displayed flow information is source IP address:sou

Page 12 - Device information

98 Configuring NTP This chapter provides an overview of the Network Time Protocol (NTP) and guides you through the configuration procedure. NOTE:

Page 13 - Device interface information

vi Configuration task list ···························································································································

Page 14 - Recent system logs

99 How NTP works Figure 43 shows the basic workflow of NTP. Device A and Device B are connected over a network. They have their own independent syste

Page 15

100 This is only a rough description for the NTP work mechanism. For more information, see RFC 1305. NTP message format NTP uses two types of message

Page 16

101 • Stratum—An 8-bit integer indicating the stratum level of the local clock, with the value ranging from 1 to 16. The clock precision decreases f

Page 17 - Tracert

102 (server mode). Upon receiving the replies from the servers, the client performs clock filtering and selection, and synchronizes its local clock t

Page 18 - Prerequisites

103 mode and continues listening to broadcast messages, and synchronizes its local clock based on the received broadcast messages. Multicast mode Fig

Page 19

104 Figure 49 Network diagram NTP configuration task list Task Remarks Configuring the NTP operation modes Required. Configuring the local clock

Page 20 - System debugging

105 receipt of a message, rather than creating an association (static or dynamic). In symmetric mode, static associations are created at the symmetri

Page 21 - Debugging a feature

106 Configuration procedure To specify a symmetric-passive peer on the active peer: Step Command Remarks 1. Enter system view. system-view N/A 2.

Page 22 - Ping example

107 Configuring the NTP multicast mode The multicast server periodically sends NTP multicast messages to multicast clients, which send replies after

Page 23

108 clock errors of the devices in the network. To configure the local clock as a reference source: Step Command Remarks 1. Enter system view. syst

Page 24 - Ping and tracert example

1 Device information Displaying device information After logging in to the Web interface, you will enter the Device Info page. Figure 1 Device overvie

Page 25

109 Step Command Remarks 2. Enter interface view. interface interface-type interface-number N/A 3. Disable the interface from receiving NTP message

Page 26 - Configuration example

110 Configuration procedure To configure the NTP service access-control right to the local device: Step Command Remarks 1. Enter system view. syste

Page 27 - Configuring TCP attributes

111 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication. ntp-service authentication enable By default, NTP aut

Page 28

112 Displaying and maintaining NTP Task Command Remarks Display information about NTP service status. display ntp-service status [ | { begin | exclu

Page 29 - Configuring TCP timers

113 Clock offset: 0.0000 ms Root delay: 0.00 ms Root dispersion: 0.00 ms Peer dispersion: 0.00 ms Reference time: 00:00:00.000 UTC Jan 1 1900 (0

Page 30

114 Figure 51 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 51. (Details not shown.) 2. Con

Page 31

115 As shown above, SecPath B has been synchronized to SecPath C, and the clock stratum level of SecPath B is 2, while that of SecPath C is 1. # View

Page 32

116 # Configure SecPath A to operate in broadcast client mode and receive broadcast messages on GigabitEthernet 0/1. <SecPathA> system-view [Se

Page 33 - Managing the file system

117 Figure 53 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 53. (Details not shown.) 2. Con

Page 34 - Deleting a file

118 As shown above, SecPath D has been synchronized to SecPath C and the clock stratum level of SecPath D is 3, while that of SecPath C is 2. # View

Page 35 - Managing directories

2 Field Description Contact Information Display the contact information for device maintenance. SerialNum Display the serial number of the device. S

Page 36 - Managing storage media

119 ************************************************************************** [1234] 3.0.1.31 127.127.1.0 2 255 64 26 -16.0 40.0

Page 37 - Partitioning a CF card

120 # Enable NTP authentication. [DeviceA] ntp-service authentication enable # Set an authentication key. [DeviceA] ntp-service authentication-keyi

Page 38

121 Figure 55 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 55. (Details not shown.) 2. Con

Page 39 - Performing batch operations

122 Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 31.00 ms Root dispersion: 8.31 ms Peer dispersion

Page 40

123 Configuring RMON This chapter provides an overview of the Remote Monitoring (RMON) and guides you through the configuration procedure. NOTE: T

Page 41 - Upgrading software

124 future retrieval. The interface traffic statistics include network collisions, CRC alignment errors, undersize/oversize packets, broadcasts, mult

Page 42 - Upgrading the BootWare

125 Figure 56 Rising and falling alarm events Private alarm group The private alarm group calculates the values of alarm variables and compares the

Page 43

126 Configuring the RMON Ethernet statistics function Step Command 1. Enter system view. system-view 2. Enter Ethernet interface view. interface i

Page 44 - Installing hotfixes

127 • After the maximum number of entries is reached, no new entry can be created. For the table entry limits, see Table 25. To configure the RMON a

Page 45 - Patch states

128 Task Command Remarks Display the RMON history control entry and history sampling information. display rmon history [ interface-type interface-nu

Page 46 - ACTIVE state

3 Recent system logs Table 4 Field description Field Description Time Display the time when the system logs are generated. Level Display the level of

Page 47 - Installation prerequisites

129 etherStatsCRCAlignErrors : 0 , etherStatsCollisions : 0 etherStatsDropEvents (insufficient resources): 0 Packets received accord

Page 48

130 collisions : 0 , utilization : 0 Sampled values of record 3 : dropevents : 0 , octets

Page 49 - Confirming running patches

131 Alarm group configuration example Network requirements Configure the RMON alarm group on the RMON agent in Figure 59 to send alarms in traps when

Page 50 - Stopping running patches

132 Latest value : 0 # Display statistics for GigabitEthernet 0/1. <SecPath> display rmon statistics GigabitEthernet 0/1 EtherStatsE

Page 51

133 Configuring SNMP This chapter provides an overview of the Simple Network Management Protocol (SNMP) and guides you through the configuration proc

Page 52 - Hotfix configuration example

134 Figure 61 MIB tree A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege and is identified by a

Page 53

135 Configuring SNMP basic parameters SNMPv3 differs from SNMPv1 and SNMPv2c in many ways. Their configuration procedures are described in separate s

Page 54 - Managing configuration files

136 Step Command Remarks 8. Add a user to the SNMPv3 group. snmp-agent usm-user v3 user-name group-name [ [ cipher ] authentication-mode { md5 | sha

Page 55

137 Step Command Remarks 6. Configure SNMP access right. • (Approach 1) Create an SNMP community: snmp-agent community { read | write } community-n

Page 56 - Restoring configuration

138 Configuring SNMP logging Disable SNMP logging in normal cases to prevent a large amount of SNMP logs from decreasing device performance. The SNMP

Page 57 - Resetting the configuration

4 Using ping, tracert, and system debugging Use the ping, tracert, and system debugging utilities to test network connectivity and identify network p

Page 58

139 To generate linkUp or linkDown traps when the link state of an interface changes, enable the linkUp or linkDown trap function both globally by us

Page 59

140 Step Command Remarks 2. Configure target host. snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port

Page 60

141 Task Command Remarks Display basic information about the trap queue. display snmp-agent trap queue [ | { begin | exclude | include } regular-expr

Page 61

142 [SecPath] snmp-agent sys-info location telephone-closet,3rd-floor # Enable SNMP traps, set the NMS at IP address 1.1.1.2/24 as an SNMP trap desti

Page 62

143 [SecPath] undo snmp-agent mib-view ViewDefault [SecPath] snmp-agent mib-view included test interfaces [SecPath] snmp-agent group v3 managev3group

Page 63

144 Figure 65 Network diagram Configuration procedure For more information about the NMS and SecPath, see "SNMPv1/SNMPv2c configuration exampl

Page 64

145 Field Description errorstatus Error status, with noError meaning no error. value Value set by the SET operation. This field is null for a GET op

Page 65

146 Configuring MIB style MIBs fall into public MIBs and private MIBs. A private MIB is attached to a sub-node under the enterprises MIB node (1.3.6.

Page 66

147 Configuring RSH The RSH configuration is available only at the CLI. RSH overview Remote shell (RSH) allows you to execute the commands provided b

Page 67 - System information levels

148 Figure 67 Network diagram Configuring the remote host Windows NT, 2000, XP, and 2003 are shipped with no RSH daemon. The RSH daemon must be sep

Page 68

5 Figure 2 Page for executing the ping operation 2. Enter the IP address or the host name of the destination device in the field. 3. Click Start.

Page 69

149 3. Check for the Remote Shell Daemon entry. If it does not exist, install the daemon first. 4. Look at the Status column to check whether the R

Page 70 - System information formats

150 Configuring SSH Feature and hardware compatibility Feature F1000-A-EI/E-SI/S-AI F1000-E F5000-A5 Firewall module FIPS No No No Yes Overview Se

Page 71 - PRI (priority)

151 Stages Description Interaction After the server grants the request, the client and the server start to communicate with each other. Version nego

Page 72

152 • Password authentication—The SSH server uses AAA for authentication of the client. During password authentication, the SSH client encrypts its

Page 73

153 2. The server decrypts and executes the command, and then encrypts and sends the result to the client. 3. The client decrypts and displays the

Page 74

154 Task Remarks Configuring a client's host public key Required for publickey authentication users and optional for password authentication use

Page 75

155 Step Command Remarks 2. Enable the SSH server function. ssh server enable Disabled by default Configuring the user interfaces for SSH clients

Page 76

156 NOTE: • H3C recommends you to configure a client's host public key by importing it from a public key file. • You can configure up to 20

Page 77

157 • If publickey authentication, whether with password authentication or not, is used, the command level accessible to the user is set by the user

Page 78

158 Setting the SSH management parameters SSH management includes: • Enabling the SSH server to be compatible with SSH1 client • Setting the RSA s

Page 79

6 Executing the ping operation at the CLI Task Command Remarks Test the network connectivity to an IP address. • For IPv4 networks: ping [ ip ] [ -

Page 80

159 Specifying a source IP address/interface for the SSH client This configuration task allows you to specify a source IP address or interface for th

Page 81

160 Step Command Remarks 3. Configure the server host public key. See "Configuring a client's host public key" The method for configu

Page 82

161 Task Command Remarks Establish a connection between the SSH client and the IPv6 server, and specify algorithms involved during the connection. •

Page 83

162 SSH server configuration examples Password authentication enabled SSH server configuration example Network requirements As shown in Figure 72, a

Page 84

163 # Configure an IP address for interface GigabitEthernet 0/1, which the SSH client will use as the destination for SSH connection. [SecPath] inter

Page 85 - 1.1.0.1/16 1.2.0.1/16

164 Figure 73 Specifying the host name (or IP address) In the window shown in Figure 73, click Open to connect to the server. If the connection is

Page 86

165 Configuration procedure NOTE: During SSH server configuration, the client's host public key is required. Use the client software to gener

Page 87

166 Figure 76 Generating process After the key pair is generated, click Save public key and specify the file name as key.pub to save the public key

Page 88

167 Likewise, to save the private key, click Save private key. A warning window pops up to prompt you whether to save the private key without any pro

Page 89 - [SecPath] quit

168 Figure 78 Specifying the host name (or IP address) Select Connection > SSH > Auth from the navigation tree. The following window appears.

Page 90 - Managing logs

7 2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a TTL-expired ICMP error message to the source,

Page 91

169 Figure 79 Specifying the private key file In the window shown in Figure 79, click Open to connect to the server. If the connection is normal, y

Page 92 - Configuring user logging

170 # Generate the RSA key pairs. <Router> system-view [Router] public-key local create rsa The range of public key size is (512 ~ 2048). NOTES

Page 93

171 # Configure an IP address for interface GigabitEthernet 0/1. <SecPath> system-view [SecPath] interface GigabitEthernet 0/1 [SecPath-Gigabit

Page 94

172 [SecPath-pkey-key-code]E55B394A217DA38B65B77F0185C8DB8095522D1EF044B465E 8716261214A5A3B493E866991113B2D [SecPath-pkey-key-code]485348 [SecPath-p

Page 95

173 It will take a few minutes. Press CTRL+C to abort. Input the bits of the modulus[default = 1024]: Generating Keys... ++++++++++++++++++++++++++++

Page 96

174 # Set the user command privilege level to 3. [Router-ui-vty0-4] user privilege level 3 [Router-ui-vty0-4] quit # Import the peer public key from

Page 97 - Exporting user logs

175 Configuring SFTP Overview The Secure File Transfer Protocol (SFTP) is a new feature in SSH2. SFTP uses the SSH connection to provide secure data

Page 98 - <SecPath> system-view

176 Configuring the SFTP connection idle timeout period Once the idle period of an SFTP connection exceeds the specified threshold, the system automa

Page 99 - Configuring session logging

177 Task Command Remarks Establish a connection to the IPv4 SFTP server and enter SFTP client view. • In non-FIPS mode: sftp server [ port-number ]

Page 100

178 Step Command Remarks 3. Return to the upper-level directory. cdup Optional. 4. Display the current working directory of the remote SFTP server

Page 101 - Log report

8 Figure 5 Page for executing the tracert operation 2. Enter the IP address or host name of the destination device in the Trace Route field. 3. C

Page 102 - Displaying system logs

179 Displaying help information This configuration task will display a list of all commands or the help information of an SFTP client command, such a

Page 103

180 # Configure an IP address for interface GigabitEthernet 0/1. <SecPath> system-view [SecPath] interface GigabitEthernet 0/1 [SecPath-Gigabit

Page 104 - Displaying blacklist logs

181 # Enable the SFTP server. [Router] sftp server enable # Configure an IP address for interface GigabitEthernet 0/1, which the client will use as t

Page 105

182 sftp-client> dir -rwxrwxrwx 1 noone nogroup 1759 Aug 23 06:52 config.cfg -rwxrwxrwx 1 noone nogroup 225 Aug 24 08:01 pubk

Page 106 - Displaying user logs

183 Bye Connection closed. <SecPath> SFTP server configuration example Network requirements As shown in Figure 83, an SSH connection is require

Page 107

184 # Configure an IP address for interface GigabitEthernet 0/1, which the client will use as the destination for SSH connection. [SecPath] interface

Page 108

185 Figure 84 SFTP client interface

Page 109 - Configuring NTP

186 Managing virtual firewalls NOTE: The virtual firewall configuration is available only in the web interface. Overview The virtual device feat

Page 110 - How NTP works

187 Configuring a virtual device Configuration task list Task Description Creating a virtual device Required. You can add a member to a virtual devi

Page 111 - NTP message format

188 Item F1000-S-AI F1000-A-EI/E-SI F1000-E/F5000-A5 Firewall module Maximum number of virtual devices supported 64 128 256 256 Select Device Mana

Page 112 - NTP operation modes

Copyright © 2011-2013, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmi

Page 113 - Broadcast mode

9 • Enable sending of ICMP destination unreachable packets on the destination device. If the destination device is an H3C device, execute the ip unr

Page 114 - NTP for VPNs

189 maximum number of sessions for a virtual device must not exceed the session limit of the virtual device displayed on the Profile tab. Figure 88 P

Page 115 - NTP configuration task list

190 Adding VLANs to a virtual device Select Device Management > Virtual Device > VLAN, and the VLANs that belong to all the current virtual dev

Page 116 - Configuration procedure

191 Figure 93 Network diagram Configuration considerations • Create two virtual devices VD_A and VD_B. • Add VLAN 100 through VLAN 205 and VLAN 3

Page 117

192 Figure 95 Creating VD_B Adding interfaces to the virtual devices 1. Select Device Management > Virtual Device > Interface from the navig

Page 118

193 Figure 97 Adding VLAN members to VD_A 2. Add VLAN members to VD_B: a. Select Device Management > Virtual Device > VLAN from the navigat

Page 119

194 Configuring host traffic statistics Feature and hardware compatibility Feature F1000-A-EI/E-SI/S-AI F1000-E F5000-A5 Firewall module Host traffi

Page 120 - Configuration prerequisites

195 Specifying service type Select Network > Statistics > L2 Statistics from the navigation tree and then click the Service Configuration tab

Page 121

196 Figure 101 Basic configuration page Table 32 Configuration items Item Description Enable host traffic statistics Enable or disable the host tr

Page 122

197 Configuration procedure # Specify the IP address of the log host. • Select Log Report > Syslog from the navigation tree of the SecPath and p

Page 123 - NTP configuration examples

198 Figure 104 Configuring the customized service resource • Enter tcp-des80 for Name. • Select the TCP option. • Specify the Source Port rang

Page 124 - Network requirements

10 Figure 7 Relationship between the protocol and screen output switch Debugging a feature Output from debugging commands is memory intensive. To g

Page 125

199 Figure 105 Configuring the service group resource • Enter test for Name. • Select tcp-des80 and tcp-des8080 from the Available Group Members

Page 126

200 Figure 107 Enabling the host statistics function • Select the Enable host traffic statistics box. • Click Apply. Configuration guidelines •

Page 127

201 Configuring FTP This chapter describes how to configure FTP. NOTE: FTP configuration is available only at the CLI. Feature and hardware compa

Page 128

202 Table 33 Configuration when the device serves as the FTP client Device Configuration Remarks SecPath (FTP client) Use the ftp command to establis

Page 129 - Root delay: 40.00 ms

203 Establishing an FTP connection Before you can access the FTP server, you must establish a connection from the FTP client to the FTP server. You c

Page 130

204 Task Command Remarks Log in to the remote FTP server directly in user view. ftp ipv6 [ server-address [ service-port ] [ vpn-instance vpn-instanc

Page 131

205 Task Command Remarks Display detailed information about a directory or file on the remote FTP server. dir [ remotefile [ localfile ] ] The ls co

Page 132

206 Task Command Remarks Enable information display in a detailed manner. verbose Enabled by default. Enable FTP related debugging when the firewall

Page 133 - Root delay: 31.00 ms

207 230 Logged in successfully # Set the file transfer mode to binary to transmit boot file. [ftp] binary 200 Type set to I. # Download the boot file

Page 134 - Configuring RMON

208 Step Command Remarks 3. Use an ACL to control FTP clients’ access to the firewall. ftp server acl acl-number Optional. By default, no ACL is use

Page 135 - Alarm group

11 NOTE: Configure the debugging, terminal debugging and terminal monitor commands before you can displaydetailed debugging information on the term

Page 136 - Private alarm group

209 Step Command Remarks 5. Configure user properties. authorization-attribute { acl acl-number | callback-number callback-number | idle-cut minute

Page 137

210 # Check the available space of the Flash. Ensure adequate space for the boot file to be uploaded. <Sysname> dir Directory of flash0:/ 0

Page 138

211 Displaying and maintaining FTP Task Command Remarks Display the source IP address configuration of the FTP client. display ftp client configurat

Page 139

212 Configuring TFTP This chapter describes how to configure TFTP. NOTE: TFTP configuration is available only at the CLI. Feature and hardware co

Page 140

213 Table 35 Configuration when the device serves as the TFTP client Device Configuration SecPath (TFTP client) • Configure the IP address and routi

Page 141

214 Step Command Remarks 3. Specify the source IP address of sent TFTP packets. tftp client source { interface interface-type interface-number | ip

Page 142

215 Figure 112 Network diagram Configuration procedure 1. Configure the PC (TFTP server): a. On the PC, enable the TFTP server. (Details not show

Page 143

216 Using automatic configuration Automatic configuration enables a device without any configuration file to automatically obtain and execute a confi

Page 144 - Configuring SNMP

217 How automatic configuration works Automatic configuration works in the following manner: 1. During startup, the device sets the first up interfa

Page 145 - SNMP protocol versions

218 Using DHCP to obtain an IP address and other configuration information Address acquisition process As mentioned before, a device sets the first u

Page 146

12 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms Record Rou

Page 147

219 • If devices use different configuration files, you need to configure static address pools to ensure that each device can get a fixed IP address

Page 148 - Offset Chassis ID

220 Obtaining the configuration file Figure 115 Obtaining the configuration file A device obtains its configuration file by using the following wor

Page 149 - Configuring SNMP traps

221 • If the IP address and the domain name of the TFTP server are not contained in the DHCP response or they are illegitimate, the device broadcast

Page 150

222 Index A C D E F H I L M N O P R S T U V A Alarm group configuration example,131 C Configuration guidelines,200 Configuration prerequisites,194

Page 151

223 Managing the configuration file at the CLI,47 N NTP configuration examples,112 NTP configuration task list,104 O Outputting system information t

Page 152 - SNMP configuration examples

13 Ping and tracert example Network requirements As shown in Figure 9, SecPath failed to Telnet Device B. Verify whether SecPath and Device B can rea

Page 153 - SNMPv3 configuration example

14 3. Use the debugging ip icmp command on SecPath and Device B to verify that they can send and receive the specific ICMP packets, or use the displ

Page 154

15 Configuring IP performance optimization Enabling forwarding of directed broadcasts destined for the directly connected network Directed broadcast

Page 155

16 Figure 10 Network diagram Configuration procedure 1. Configure SecPath: # Configure IP addresses for GigabitEthernet 0/1 and GigabitEthernet 0/

Page 156

17 Step Command Remarks 2. Enter interface view. interface interface-type interface-number N/A 3. Configure the TCP MSS of the interface. tcp mss v

Page 157 - Configuring MIB style

18 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable TCP path MTU discovery. tcp path-mtu-discovery [ aging minutes | no-aging

Page 158 - Configuring RSH

Preface The H3C SecPath Series High-End Firewalls documentation set includes 10 configuration guides, which describe the software features for the H3C

Page 159 - Configuring the remote host

19 Configuring ICMP to send error packets Sending error packets is a major function of ICMP. In case of network abnormalities, error packets are usua

Page 160 - Configuring the SecPath

20 { When forwarding a packet, if the MTU of the sending interface is smaller than the packet, but the packet has been set as "Don't Fragm

Page 161 - Configuring SSH

21 Step Command Remarks 2. Set the packet forwarding mode. ip forwarding { per-flow | per-packet } By default, the packet forwarding mode is per-pac

Page 162 - Authentication

22 Managing the file system This chapter describes how to manage the file system of your firewall, including the storage media, directories, and file

Page 163 - Interaction

23 Displaying file contents Task Command Remarks Display the contents of a file. more file-url [ | { begin | exclude | include } regular-expression

Page 164 - SSH support for VPNs

24 Restoring a file from the recycle bin Task Command Remarks Restore a file from the recycle bin. undelete file-url Available in user view Empty

Page 165

25 Displaying the current working directory Task Command Remarks Display the current working directory. pwd Available in user view Changing the c

Page 166

26 • If a storage medium is partitioned, the name of a partition is composed of the physical device name and the partition number. The sequence numb

Page 167 - Configuring an SSH user

27 Before partitioning a CF card, back up the files in the CF card. The partition operation clears all data in the CF card. After partitioning a CF

Page 168

28 Checking files After files are written to the NAND flash memory, use the following commands together to check the content of these files. To check

Page 169

Convention Description [ x | y | ... ] * Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you se

Page 170

29 File system management examples # Display the files and the subdirectories in the current directory. <Sysname> dir Directory of flash0:/

Page 171

30 Upgrading software You can use the CLI, BootWare menus, or Web interface to upgrade software. This chapter describes how to upgrade software from

Page 172

31 Upgrading method Software types Remarks Installing hotfixes System software image Hotfixes repair software defects without requiring a reboot or

Page 173

32 Upgrading system software from the web interface IMPORTANT: Upgrading software takes some time. To prevent upgrade failure, do not perform any o

Page 174

33 Upgrading system software from the CLI Step Command Remarks 1. Use FTP or TFTP to transfer the system software image to the root directory of th

Page 175

34 Patch states A patch is in IDLE, DEACTIVE, ACTIVE, or RUNNING state, depending on the patch manipulation command. Patch manipulation commands incl

Page 176

35 Figure 14 Patches that are not loaded to the memory patch area DEACTIVE state Patches in DEACTIVE state have been loaded to the memory patch are

Page 177

36 Figure 16 Patches that are activated RUNNING state After you confirm ACTIVE patches, their states change to RUNNING and persist after a reboot.

Page 178

37 • Make sure the patch file matches the device model and software version. • Save the patch file to the root directory of the device's stora

Page 179

38 If the patch file is saved in the root directory, you do not need to specify the patch location. If not, you must specify the patch file location.

Page 180

Obtaining documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on t

Page 181

39 Step Command 1. Enter system view. system-view 2. Confirm the running of patches. patch run [ patch-number ] Uninstalling a patch step by step

Page 182

40 Software upgrade configuration examples Scheduled upgrade configuration example Network requirements As shown in Figure 18: • The current system

Page 183

41 startup saved-configuration new-config.cfg boot-loader file soft-version2.bin main reboot 2. Configure the SecPath firewall: # Log in to the FTP

Page 184

42 Figure 19 Network diagram Configuration procedure This example assumes that the SecPath firewall and the TFTP server can ping each other. 1. Co

Page 185

43 Managing configuration files You can use the CLI, BootWare menus, or Web interface to manage configuration files. This chapter explains how to man

Page 186 - Configuring SFTP

44 • Only non-default configuration settings are saved. • The commands are listed in sections by views, usually in this order: system view, interfa

Page 187

45 To save the running configuration in fast mode, click the Save button at the upper right of the auxiliary area. To save the running configuration

Page 188

46 To restore configuration: 1. Select Device Management > Maintenance from the navigation tree. 2. Click Restore. Figure 22 Restoring configura

Page 189 - Working with SFTP files

47 Importing a configuration file This operation allows you to import a .cfg file from your host to the device and execute the configuration in the f

Page 190 - Displaying help information

48 • Private key: A configuration file encrypted by this kind of key can be decrypted and recognized only by the local device. • Public key: A conf

Page 191

i Contents Device information ························································································································

Page 192

49 Configuring configuration rollback Configuration rollback allows you to revert to a previous configuration state based on a specified configuratio

Page 193

50 The number of saved configuration files has an upper limit. After the maximum number of files is saved, the system deletes the oldest files when t

Page 194

51 Manually saving the running configuration Automatic saving of the running configuration occupies system resources, and frequent saving can greatly

Page 195

52 • Use the save command. If you save the running configuration to the specified configuration file in the interactive mode, the system automatical

Page 196

53 • Startup configuration files are corrupted, which is often caused by loading an incorrect configuration file. With startup configuration files d

Page 197 - Managing virtual firewalls

54 Task Command Remarks Display the running configuration of the device. display current-configuration [ configuration [ configuration ] | interface

Page 198 - Configuring a virtual device

55 Configuring the information center This chapter describes how to configure the information center. NOTE: The information center configuration i

Page 199

56 Figure 25 Information center diagram By default, the information center is enabled. It affects system performance to some degree when processing

Page 200

57 Table 6 Severity description Severity Severity value Description Corresponding keyword in commands Emergency 0 The system is unavailable. emerge

Page 201

58 Information channel number Default channel name Default output destination Description 8 channel8 Not specified Receives log, trap, and debugging

Page 202 - GE0/2GE0/1

ii Displaying the current working directory ··········································································································

Page 203

59 Output destination Modules allowed LOG TRAP DEBUG Enabled/disabled Severity Enabled/disabled Severity Enabled/disabled Severity Log buffer All def

Page 204

60 The closing set of angel brackets (< >), the space, the forward slash (/), and the colon (:) are all required in the above format. What foll

Page 205 - Configuration task list

61 Time stamp parameter Description Example iso Time stamp format stipulated in ISO 8601 Only the system information sent to a log host supports this

Page 206 - Specifying service type

62 For system information destined to the log host: • If the character string ends with (l), the information is log information • If the character

Page 207

63 Outputting system information to the console Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info

Page 208

64 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Optional. Enabled by default. 3

Page 209

65 Step Command Remarks 3. Name the channel with a specified channel number. info-center channel channel-number name channel-name Optional. See Tabl

Page 210

66 Step Command Remarks 4. Configure an output channel for the trap buffer and specify the buffer size. info-center trapbuffer [ channel { channel-n

Page 211

67 Outputting system information to the SNMP module The SNMP module only receives trap information, and discards log and debug information. To monito

Page 212 - Configuring FTP

68 Step Command Remarks 2. Enable the information center. info-center enable Optional. Enabled by default. 3. Name the channel with a specified cha

Page 213

iii System information levels ························································································································

Page 214

69 Step Command Remarks 6. Configure the maximum size of the log file. info-center logfile size-quota size Optional. By default, the maximum size of

Page 215

70 Saving security logs into the security log file With this feature enabled, when the system outputs the system information to a specified destinati

Page 216

71 Task Command Remarks Display the summary of the security log file. display security-logfile summary [ | { begin | exclude | include } regular-expr

Page 217

72 Task Command Remarks Perform these operations to the security log file. • Display the contents of the specified file: more file-url • Display in

Page 218

73 Enabling synchronous information output The output of system logs interrupts ongoing configuration operations, and you have to find the previously

Page 219

74 Displaying and maintaining information center Task Command Remarks Display information about information channels. display channel [ channel-numb

Page 220

75 1. Configure the SecPath # Enable the information center. <SecPath> system-view [SecPath] info-center enable # Specify the host 1.2.0.1/16

Page 221

76 Now, the system can record log information into the log file. Outputting log information to a Linux log host Network requirements Configure the Se

Page 222 - Remarks

77 NOTE: Be aware of the following issues while editing the file /etc/syslog.conf: • Comments must be on a separate line and must begin with a pou

Page 223 - Configuring TFTP

78 [SecPath] quit # Enable the display of log information on a terminal. (Optional, this function is enabled by default.) <SecPath> terminal mo

Page 224 - Configuring the TFTP client

iv Configuration guidelines ··························································································································

Page 225

79 Managing logs This chapter describes how to manage various types of logs. Configuring syslog Syslog can be configured only in the Web interface.

Page 226 - <Sysname> reboot

80 Figure 29 Syslog Table 11 Configuration items Item Description Log Buffer Size Set the number of syslogs that can be stored in the log buffer.

Page 227

81 Item Description Log Host IP Address Log Host 1 Set the IPv4/IPv6 addresses, port number and the VPN instance (this option is available only when

Page 228

82 Table 13 Packet format in user logging version 3.0 Field Description Prot Protocol carried over IP. Operator Indicates the reason why a flow has

Page 229 - Address acquisition process

83 Figure 30 User logging Table 14 Configuration items Item Description Version Set the version of user logging: 1.0 or 3.0. IMPORTANT: Configure

Page 230 - File types

84 Item Description Log Host Configuration Log Host 1 Set the IPv4/IPv6 addresses, port number, and the VPN instance of the log hosts. You can speci

Page 231 - TFTP request sending mode

85 Task Remarks Exporting user logs Exporting user logs to a log server Use either method. Exporting user logs to the information center Configurin

Page 232

86 Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the system to record user logs in localtime. userlog flow export timest

Page 233

87 Step Command Remarks 1. Enter system view. system-view N/A 2. Export user logs to the information center. userlog flow syslog User logs are exp

Page 234

88 # Export User's user logs to the log server with IP address 1.2.3.6:2000. [SecPath] userlog flow export host 1.2.3.6 2000 # Configure the sou

Commentaires sur ces manuels

Pas de commentaire