H3C iMC UBA

H3C IMC User Behavior Auditor (UBA) works with network devices to audit the network access behaviors of endpoint users.

UBA supports querying and auditing the NAT 1.0, Flow 3.0, NetStream V5/V9, NetFlow V5/V9, and DIG logs. The network administrator can audit the network access behaviors of users based on network logs.

Learn more Show less
  • Features
  • Specification
  • Networking Application
  • Ordering Information
  • Resources
  • Software

Features

Full-scale log collection

UBA supports collecting various network logs, including NAT 1.0, Flow 3.0, NetStream V5/V9, NetFlow V5/V9, and DIG logs. When a device does not support any of the logs mentioned above, you can collect traffic on the device through a mirroring port on the device or a network test access point (TAP) and generate DIG logs.

Full-scale log collection

Distributed deployment

UBA uses the distributed architecture, and supports collecting logs on multiple devices and auditing the logs on a unified Web interface. With UBA, the network administrator can flexibly, efficiently monitor the network.

Powerful log auditing

UBA can fast audit network logs according to the following criteria and the combination of them as needed: access usernames, network access time, URLs of visited Web pages, names of files transmitted by FTP, email subject, and so on. Additionally, UBA can flexibly sort, group, and save the audit results.

The network administrator can accurately audit the network access behaviors of endpoint users from massive network logs. The log audit results can include the following information: when an endpoint user accesses which website or Web page, what emails an endpoint user sends, what files an endpoint user sends, and so on. Log audit includes the following types:

* General audit—Audits the access usernames, network access start time and end time, source and destination IP addresses, source and destination ports, protocols, and applications.

* Web visiting audit—Audits the access usernames, network access start time and end time, source and destination IP addresses, ports, visited websites, and visited Web pages.

* FTP audit—Audits the access usernames, file transmission start time and end time, source and destination IP addresses, ports, FTP usernames, names of transmitted files, and transmission types (upload/download).

* Mail audit—Audits the access usernames, mail sending time, source and destination IP addresses, senders, recipients, and mail subjects.

* NAT audit—Audits the access usernames, network access start time and end time, source and destination IP addresses, source and destination ports, protocols, applications, and IP addresses and ports before and after NAT.

* Telnet audit—Audits the source and destination IP addresses, ports, Telnet usernames, and executed commands.

UBA log audit

User behavior-based audit

Working with the IMC EAD solution, UBA can efficiently manage network users, record detailed network access logs for users, and provide effective network management and user behavior auditing policies to help the administrator analyze network access behaviors of users.

Layer 7 application auditing

Applications with unfixed port numbers (for example, P2P) are recognized based on the application layer data characteristics of packets. Based on Layer 7 application recognition and classification, UBA can comprehensively audit Layer 7 application usage in the network. UBA configures most common applications with unfixed port numbers as predefined applications, for example, DC, eDonkey, Gnutella, Kazaa, MSN, QQ, and AIM. The administrator can define other applications as needed. Layer 7 application recognition takes effect only on DIG logs, and does not take effect on the other types of logs.

Task-based auditing

UBA provides task-based automatic tracing and auditing, which allows you to customize audit tasks flexibly based on access usernames, visited Web page URLs, and other criteria. After a task is customized, UBA will automatically trace and audit all users and their logs matching the criteria within the specified time range. Audit tasks include NAT audit, Web visiting audit, FTP audit, mail audit, and so on.

Log export

UBA supports exporting massive logs. You can regularly export the sensitive logs and the logs that cannot be saved because of limited database space to a database file to save them in a different place. Additionally, UBA provides a tool for users to query exported logs.

Auditing reports

UBA provides professional reports, including TopN reports by visited website, session count, application distribution, and unknown application and analysis reports for applications such as SMTP, HTTP, and FTP. Each report can be output in the graph or list form with the statistics collection period as day, week, and so on. With these reports, the administrator can clearly know the network usage conditions of users.

Specification

Item

Specifications

Hardware platform

PC server: CPU base frequency ≥ 3GHz, memory size ≥ 4G, hard disk space ≥ 10G, a minimum of one 10/100/1000Mbps autosensing NIC, Windows (32-bit or 64-bit), Linux (32-bit or 64-bit)

PC client: CPU base frequency ≥ 1.8GHz, memory size ≥ 512MB, hard disk space ≥ 20GB, 48x optical drive, 100Mbps NIC, resolution 1024*768, sound card

Operating system

Server: Windows Server 2003 / Windows Server 2008 (32-bit or 64-bit), Windows Server 2012 (64-bit), Red Hat Enterprise Linux Server 5/5.5/5.9/6.1/6.4 (32-bit or 64-bit)

Client: Windows, MAC OS, Redhat Linux

Browser: IE9/IE10, Firefox 20 or later, Chrome 26 or later

Database

SQL Server 2005/SQL Server 2008/SQL Server 2012 (Windows)

Oracle 11g Release 1 or Oracle 11g Release 2 (Linux)

Networking Application

Product ID

Description

SWP-IMC7-UBA

H3C IMC, User Behavior Auditor Component (1000 Licenses)

LIS-IMC7-UBAA-1K

H3C IMC, User Behavior Auditor Component, 1000 Licenses

LIS-IMC7-UBAC-5K

H3C IMC, User Behavior Auditor Component, 5000 Licenses

Ordering Information

Product ID

Description

SWP-IMC7-UBA

H3C IMC, User Behavior Auditor Component (1000 Licenses)

LIS-IMC7-UBAA-1K

H3C IMC, User Behavior Auditor Component, 1000 Licenses

LIS-IMC7-UBAC-5K

H3C IMC, User Behavior Auditor Component, 5000 Licenses

Resources

Software