03-Monitor

HomeSupportSecurityH3C SecPath F5000 FirewallConfigure & DeployConfiguration GuidesH3C Firewall Products Comware 7 Web Configuration Guide(E1196 E8371)-6W70003-Monitor
Table of Contents
Related Documents
70-Risk analysis
Title Size Download
70-Risk analysis 30.42 KB

Risk analysis

 

This help contains the following topics:

·     Introduction

·     Configure risk analysis

Introduction

This feature scans devices in an IPv4 or IPv6 address range to find whether the following risks exist on these devices:

·     Specific TCP or UDP ports are opened.

·     IPS profile not configured.

·     WAF profile not configured.

·     Weak passwords.

You can enhance the device security based on the scan result.

Table 1 shows the measure to be taken for each risk type.

Table 1 Measure for each risk type

Risk type

Measure

Open TCP or UDP ports

Configure dropping packets destined for the ports.

IPS profile not configured

Configure an IPS profile.

WAF profile not configured

Configure a WAF profile.

Weak passwords

Configure a strong password.

 

Restrictions and guidelines

·     For an IPv4 address range to be scanned, each of the four section of the start address must be greater than the corresponding section of the end address. Otherwise, no scanning results can be obtained.

·     For an IPv6 address range to be scanned, the start address must be greater than the end address. Otherwise, no scanning results can be obtained.

·     To obtain accurate scanning results, do not modify the security policy configuration during the scanning process.

·     If you perform a security policy import or export operation after a scanning task is completed, it is recommended that you perform the scanning task again and then perform bulk risk management.

Configure risk analysis

1.     Click the Monitor tab.

2.     In the navigation pane, select Diagnosis Center > Risk Analysis.

3.     Select an address type. Options are IPv4 and IPv6.

4.     Configure an IP address range.

5.     Select or enter TCP port numbers.

6.     Select or enter UDP port numbers.

7.     Choose whether to enable weak password scanning. After enable this function, click Configure to configure the scanning range and scanning mode.

8.     Click Scan.

During the scanning progress, you can minimize the scanning progress window and perform operations on other pages. To view risk analysis results, select one or more entries in the Scanning records area, and then click Search.

9.     Click Bulk risk management.

10.     Select an address type and a security policy to display related risks.

11.     Select the risks requiring management, and click Risk management.

12.     Configure a security policy to deal with the risks, as shown in Table 2.

Table 2 Security policy configuration items

Parameter

Description

Management mode

Specify a management mode:

·     Create security policy—Create a new policy based on the policy template.

·     Edit security policy—Edit the existing policy based on the policy template.

Name

Enter the policy name. Policies of the same type cannot have the same policy name.

Address type

Specify an address type: IPv4 or IPv6.

Policy template

Select a policy template. As a best practice, select the security policy associated with the risks.

Source zone

Configure source security zones as filtering criteria for the security policy.

Source IP/MAC address

Configure source IP or MAC addresses as filtering criteria for the security policy. Source MAC addresses are supported as filtering criteria for only IPv4 security policies.

Destination IP

Configure destination IP addresses as filtering criteria for the security policy.

Service

Configure services as filtering criteria for the security policy.

Action

Specify an action:

·     Permit—Allows packets matching the filtering criteria to pass through.

·     Deny—Drops packets matching the filtering criteria to pass through.

Content security

Configure content security settings. If a profile is specified, the system performs DPI on matching packets.

 

13.     Click OK.

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网