VHSM Hillstone Security Management 11 PDF
VHSM Hillstone Security Management 11 PDF
TechDocs | docs.hillstonenet.com
Copyright 2022 Hillstone Networks. All rights reserved.
Information in this document is subject to change without notice. The software described in
this document is furnished under a license agreement or nondisclosure agreement. The software
may be used or copied only in accordance with the terms of those agreements. No part of this
publication may be reproduced, stored in a retrieval system, or transmitted in any form or any
means electronic or mechanical, including photocopying and recording for any purpose other
than the purchaser's personal use without the written permission of Hillstone Networks.
Hillstone Networks
Commercial use of the document is forbidden.
Contact Information:
US Headquarters:
Hillstone Networks
5201 Great America Pkwy, #420
Santa Clara, CA 95054
Phone: 1-408-508-6750
https://www.hillstonenet.com/about-us/contact/
Hillstone Networks
TWNO: TW-HSM-WUG-4.19.0-EN-V1.0-12/7/2022
Contents
Contents 1
Preface 1
Conventions 1
Overview 1
Targeted Readers 1
vHSM Models 1
Supported Features 2
Deploy vHSM 4
Deployment Scenario 4
System Requirements 5
Deploying vHSM 5
Installing vHSM 5
Disk Expansion 9
TOC - 1
System Requirements 16
Deploying vHSM 17
Installing vHSM 17
Disk Expansion 19
Deploying 19
Visiting vHSM 24
Disk Expansion 24
System Requirements 26
TOC - 2
Step 3: Installing system package 28
System Requirements 32
Disk Expansion 39
Upgrading Method 48
TOC - 3
Login Information 52
Exit HSM 54
About 54
Task Panel 54
Dashboard 57
Pre-defined Panel 57
Overview 57
System Statistics 58
System Information 59
System Resources 59
Time Axis 61
VPN 63
Traffic 63
TOC - 4
Last 5 Minutes User Traffic Ranking TOP10 64
Security 64
User-defined Panel 65
Tool Bar 70
User Management 73
Creating a User 74
Editing a User 76
Deleting a User 77
Enabling/Disabling a User 77
Resetting Password 77
Creating a Role 79
Deleting a Role 80
TOC - 5
User Authentication 80
AAA Server 82
Service Configuration 89
WEB PORT 90
REST API 91
Encryption Protocol 93
Service Status 94
SNMP 95
Configuring SNMP 95
Resource Management 96
Disk Management 96
Auto Cleanup 97
Manual Cleanup 97
Distribute Management 99
TOC - 6
Monitor Configuration 104
HA Management 117
Rollback 122
License 125
TOC - 7
SMS Gateway 126
Log 133
TOC - 8
Log Filtering 141
Toolbar 145
TOC - 9
Session Query 162
Filter 187
TOC - 10
Upgrading Signature Database 189
TOC - 11
Searching Change History 203
TOC - 12
Deployment Scenario 221
Requirement 221
TOC - 13
Rule Match Analysis 245
iQoS 258
Pipes 259
TOC - 14
Creating a Pipe 265
NAT 277
Route 287
LLB 295
Zone 307
TOC - 15
Service Books 310
Schedules 315
Interface 317
Avti-Virus 331
TOC - 16
Botnet Defense 345
VPN 349
PKI 368
User 371
Role 380
TOC - 17
Deleting a Rule Group 413
iQoS 420
NAT 420
TOC - 18
Setting Father NAT 433
Route 436
Method 1: 439
Method 2: 440
Zone 444
TOC - 19
Schedules 450
Interface 453
Anti-Virus 459
Role 473
TOC - 20
AAA Server 473
Result 481
Result 484
TOC - 21
Task Management 489
Ticket 493
TOC - 22
Matching Mode 506
Network 513
Monitor 517
TOC - 23
User Monitor 525
Traditional 535
Intelligence 537
TOC - 24
Drill-down Sub-page 546
MyMonitor 548
VPN 551
Overview 551
Tunnel 557
Topology 563
Map 566
Lines 567
TOC - 25
Network Topology 575
TOC - 26
Viewing a Report File 593
TOC - 27
Introduction to Log 616
Log 616
Toolbar 620
TOC - 28
Preface
Thanks for choosing the network security products from Hillstone Networks. This document is
an online help for HSM, mainly covering the following contents:
Conventions
This manual uses the following conventions for your convenience to read and understand:
l Note: indicates important instructions for you better understanding, or cautions for possible
system failure.
l Bold font: indicates links, tags, buttons, checkboxes, textboxes, or options. For example,
"Click Login to log into the homepage of the device", or "To change MTU, select Manual,
and type an appropriate value into the textbox."
l CLI: brace ({ }) indicates a required element; square bracket ([ ]) indicates an optional ele-
ment; vertical bar (|) separates multiple mutually exclusive options; bold indicates an essential
keyword in the command, and you must enter this part correctly; italic indicates a user-spe-
cified parameter.
l The command examples may vary from different platforms. In the command examples, the
hostname in the prompt is referred to as host-name.
Preface 1
Overview
The Virtual Hillstone Security Management (vHSM) is a software product, a HSM system running
on a virtual machine.HSM can centralize the control and management of multiple Hillstone
devices in the network.
Targeted Readers
This guide is intended for administrators who want to install HSM of Hillstone Networks. Before
deploying vHSM, the administrator should be familiar with the concept and components of
VMware or KVM. This document is written with readers in mind that have already known basic
virtualization knowledge, and it will only introduce operations of how to install vHSM.
vHSM Models
vHSM is available in three models in terms of hard disk capacity: 100G, 500G and 2T. All models
can be installed on VMware ESXi and VMware Workstation. You can choose product according
to your actual needs.
The capacity is as listed below:
Capacity vHSM
CPU 4 Cores
Memory 8 GB
Overview 1
Capacity vHSM
Maximum Nested 8
Levels of Shared
Object
Supported Features
vHSM supports the following features:
Overview 2
l Viewing the running status, resource utilization, logs, etc. of the managed devices;
l Monitoring the managed devices and viewing monitor details, including traffic monitor, user
monitor, NBC monitor, etc.;
l Monitoring the operation status of managed devices by alarms. This function can help you to
learn problems in network devices timely, speed up response to network problems, and lower
risks of network failures;
l Obtaining device statistics reports periodically. This function allows you to learn network
status and analyze network accurately;
l Centralizing policy management and batch deploying rules. This function improves availability
and usability of policy management;
Overview 3
Deploy vHSM
This chapter introduces for administrators who want to install HSM of Hillstone Networks on
Workstation, ESXi Server, KVM and AWS host . Before deploying vHSM, the administrator
should be familiar with the concept and components of VMware or KVM. This document is writ-
ten with readers in mind that have already known basic virtualization knowledge, and it will only
introduce operations of how to install vHSM.
l To install vHSM on ESXi Server host, please refer to Deploying vHSM on VMware ESXi.
Deployment Scenario
You may refer to the following deployment scenario to deploy your vHSM.
Deploy vHSM 4
System Requirements
To deploy vHSM:
l The physical server should have at least 4 vCPU and 4 GB memory available.
Deploying vHSM
To improve manageability and make full use of vSphere Hypervisor, we suggest you to use
vCenter and vSphere Client to manage ESXi servers.
Installing vHSM
Before installation of vHSM, please set up your ESXi Server, vCenter Server and vSphere Client
host, then get the vHSM disk.
2. In vSphere Client, enter the IP address or name of vCenter Server, then username and pass-
word, click Login.
Deploy vHSM 5
3. After logging in vCenter, from left list, click the ESXi host which vHSM will belong to,
then select File > Deploy OVF Template.
4. In the pop-up dialog box, click Browse, browse your PC and import vHSM's OVA file to
vCenter, click Next.
6. Enter the name of the OVF template, and select the location of list, click Next.
7. Select the host or cluster to deploy the OVF template on it, click Next.
8. Select the resource pool to run the OVF template in it, click Next.
This page is displayed only when the cluster contains a resource pool.
Deploy vHSM 6
9. Select data storage to store the deployed OVF template, then choose the Thick Provision
Lazy Zeroed format, click Next.
After all the setups above, you can now start your vHSM.
2. Right click vHSM on virtual machine, and select Open Console. In the prompt, you are
accessing to vHSM's console port.
5. When the prompt shows the command line interface below, enter default username and pass-
word (hillstone/hillstone) to log in vHSM.
In order to operate vHSM easily, it is recommended to log in and configure via WebUI. For the
first time to access vHSM via WebUI, take the following steps:
Deploy vHSM 7
1. Collect necessary information from your network administrator. You need to have eth0's IP
address, network mask, and gateway IP address.
2. Modify eth0's default IP address to a static IP address you collected from administrator
(192.168.1.1 by default). To modify IP address for eth0, use the following command:
3. Add a static route. Use the command below to add a route whose next hop is the gateway.
[hillstone]route addip-address
6. Type the default username (admin), password (hillstone) and verification code into the
boxes respectively. If typing the wrong password for three times, HSM will lock your
Deploy vHSM 8
account for 30 minutes, and disable your account for 30 minutes when you type wrong pass-
word the fourth times.
Notes: To make vHSM to manage devices normally, make sure that the vHSM is
routed up to the managed devices.
Disk Expansion
You can expand disks if necessary. Take the vHSM deployed on EXSi server as an example, take
the following steps:
2. You can expand the disk capacity only when powering off the virtual machine. Right-click
the virtual machine in the left list and choose Power> Power Off.
3. Right-click the virtual machine in the left list and choose Edit Settings. The Virtual
Machine Properties dialog box appears. Select Hardware tab, and then click Add to enter
Deploy vHSM 9
the Add Hardware dialog box.
Deploy vHSM 10
4. Select Hard Disk tab, and then click Next .
Deploy vHSM 11
5. Select Create a new virtual disk , and then click Next .
Deploy vHSM 12
6. Set the disk capacity by requirement, and then click Next .
Deploy vHSM 13
7. Select the default virtual device node, and then click Next .
Deploy vHSM 14
8. Click Finish to add the hardware. When the Hardware tab appears, click OK .
9. Right click vHSM on virtual machine, and select Open Console. In the prompt, you are
accessing to vHSM's console port.
10. Click the green button to start the vHSM virtual machine.
Deploy vHSM 15
12. When the prompt shows the command line interface below, enter default username and pass-
word to log in vHSM.
[hillstone] extendLVM
System Requirements
To deploy vHSM:
l The physical server should have at least 4 vCPU and 4 GB memory available.
Deploy vHSM 16
Deploying vHSM
Installing vHSM
Before installation of vHSM, please set up your Workstation host, then get the vHSM disk and
USB Key.
2. In Workstation, select File > Open, browse your PC and click Open to import vHSM's
OVA file in the pop-up dialog box.
3. Enter the name of the virtual machine, and type or select the directory where stores virtual
machine, click Import.
After all the setups above, you can now start your vHSM.
Deploy vHSM 17
1. In Workstation, click the virtual machine which vHSM will run on.
2. Click Power on this virtual machine on right page, in the prompt, you are accessing to
vHSM's console port.
4. When the prompt shows the command line interface below, enter default username and pass-
word (hillstone/hillstone) to log in vHSM.
Please refer to Visiting WebUI of vHSM in Installing vHSM on VMware ESXi chapter.
Deploy vHSM 18
Disk Expansion
Deploying
The following steps use Python and pip to install AWS CLI version 1 on Windows.
Configure the settings that the AWS CLI uses to interact with AWS, including access key ID,
secret access key and AWS region, use the following steps:
1. Enter the following command to configure access key, secret access key and region name.
you can click User Name > My Security Credentials on AWS platform to view.
Deploy vHSM 19
aws configure
1. Enter the following to create a role named vmimport, and provide VM Import / Emport
with access to the role.
aws iam create-role --role-name vmimport --assume-role-policy-document file://trust-
policy.json
"Version":"2012-10-17",
"Version":"2012-10-17",
"Statement":[
{ "Sid":"",
"Effect":"Allow",
"Principal":{
"Service":"vmie.amazonaws.com",
"AWS": "arn:aws-cn:iam::969408142281:
user/hillstonerd"
},
"Action":"sts:AssumeRole",
"Condition":{
"StringEquals":{
"sts:ExternalId":"vmimport"
Deploy vHSM 20
}
}
}
]
}
Notes:
l The external ID needs to be commanded as vmimport.
{
"Version": "2012-10-17",
"Statement": [
{ "Effect": "Allow",
"Action": [
"s3:*"
],
"Resource": "*"
},
Deploy vHSM 21
{ "Effect": "Allow",
"Action": [
"ec2:*"
],
"Resource": "*"
}
]
}
Notes:
l The "Version" in the role-policy.json file is not a user-defined ver-
sion number, but the version of vmimport in AWS.
3. Click Services > S3 on AWS Management Console, and Select a bucket or create a new
bucket, click Upload to upload the VMDK file to the specified bucket.
{
"Description": "VHSM",
"Format": "VMDK",
"UserBucket": {
"S3Bucket": "zylu-test",
"S3Key": "VHSM4.2.0_IN_TEST-disk1.vmdk"
}
}
Deploy vHSM 22
Notes:
l The "format" need to be VMDK or VHD.
5. Click Service > EC2 > ELASTIC BLOCK STORE > Snapshots on AWS Management
Console, select a snapshot and right click Create Image to create a 250GB image that root
device name is /dev/xvda.
Click Image > AMI in the EC2 page, select the image and click Launch.
2. Configure the instance details. it is recommended to use the default configuration. Click
Next.
7. Select a key pair or create a new key pair and click Launch Instance.
Note: Download the established key pair and decrypt it with PuTTYGen.
Deploy vHSM 23
Visiting vHSM
After all the setups above, you can nowvisit your vHSM.
Visiting vHSM via PuTTY
1. Click PuTTY, type the HostName, port number as 22 and select SSH in the PuTTY Con-
figuration dialog.
Note: The HostName is root@public DNS(IPv4) or hillstone@public DNS(IPv4).
2. Click Connection > SSH > Auth, select the key file decrypted by PuTTYGen and click
Open.
3. At the command interface, enter the password corresponding to the user name and log in
vHSM.
Note: Port 8080/80/443 is disabled by default. After login, you can modify the HTTP /
HTTPS port number.
l After modifying the HTTP / HTTPS port, log in through the public DNS (public IP): port.
Disk Expansion
You can expand disks if necessary. To expand disks on AWS, take the following steps:
Deploy vHSM 24
1. On AWS Management Console, select EC2 > Volumesand click Create Volume.
2. Select the new volume and right click Attach Volume, select the specified instance.
3. Click Attach.
4. Login vHSM thourgh PuTTY, enter the following command to expand disk.
extendLVM
5. Restart vHSM.
Deploy vHSM 25
Deploying vHSM on KVM
vHSM is packed in an qcow2 file, and can be installed on a KVM host running on a Linux system
with libvirt library whose version is 1.2.2 or later.
To deploy vHSM on Kernel-based Virtual Machine (KVM), you should be already familiar with
Linux system and KVM installation.
Now we respectively use Ubuntu and CentOS as example to describe how to deploy vHSM on
KVM.
System Requirements
To deploy vHSM on KVM running on Ubuntu, the host should meet the following requirements:
l 64 bit CPU which can provide four virtual cores, and its virtualization is enabled
l at least 4 GB memory
l For KVM environment establishment, the Linux system should have installed KVM, qemu,
qemu-kvm, lrzsz, bridge-utils, libvirt, virtinst , python-libvirt, virt-viewer and virt-manager
(To install these components, use command: sudo apt-get install kvm qemu qemu-kvm lrzsz
bridge-utils libvirt-bin virtinst python-libvirt virt-manager virt-viewer).
Deploy vHSM 26
Installing vHSM on KVM Host
2. In Windows, log into the KVM host, enter the following command to create a directory
which will be used to store qcow2 file.
sudo mkdir /images/disk/
3. In this directory, enter the following command, a dialog box will prompt.
rz
4. In the dialog box, browse your computer and select the qcow2 file. The files will be
uploaded to the above directory of KVM host.
6. If there is an qcow2 file in the file list, it means file is uploaded successfully.
If the vHSM wants to access to external networks, you should create a virtual bridge on the KVM
host, and then place the host's two interfaces i.e. eth0 and eth1 under the virtual bridge. Once
vHSM is installed successfully, each interface becomes a virtual bridge, and automatically con-
nects to a vnet interface of KVM. So, when you install the qcow2 file, place the vnet interface of
KVM under the new created virtual bridge, then the external networks can be accessible.
1. In the root directory of KVM host, enter the following command to create a virtual bridge.
sudo brctl addbr br0
Deploy vHSM 27
2. Add eth0 and eth1 to the virtual bridge.
sudo brctl addif br0 eth0
sudo brctl addif br0 eth1
3. Modify the IP address of eth0 or eth1 to arbitrary one, then assign the original IP address of
eth0 or eth1 to the virtual bridge interface.
sudo ifconfig eth0 ip-address netmask netmask
sudo ifconfig br0 ip-address netmask netmask
4. In Linux, use command brctl show to show virtual bridge and interfaces.
Enter into the Linux graphical interface, to install and start vHSM, use the following steps:
Deploy vHSM 28
2. Click the icon which is used to create a new virtual machine, and set as shown below.
3. Browse the file system of KVM host and select the qcow2 file in step 1.
Deploy vHSM 29
5. Choose Memory and CPU settings.
6. Check the Customize configuration before install check box, then select virtual bridge.
Deploy vHSM 30
7. Select the Boot Options tab, then check Hard Disk in the right page.
8. Select the SATA Disk 1 tab, then set Disk bus and Storage format in the right page.
9. Add the vnet interface to the virtual bridge created in step 2 and set device model.
Deploy vHSM 31
10. Create a virtual network interface and add it to the virtual bridge created in step 2.
Please refer to Visiting WebUI of vHSM in Installing vHSM on VMware ESXi chapter.
System Requirements
To deploy vHSM on KVM running on CentOS, the host should meet the following requirements:
l 64 bit CPU which can provide four virtual cores, and its virtualization is enabled
Deploy vHSM 32
l at least 4 GB memory
l For KVM environment establishment, the Linux system should have installed KVM, qemu,
qemu-kvm, lrzsz, bridge-utils, libvirt, virtinst , python-libvirt, virt-viewer and virt-manager
(To install these components, use command: yum -y install kvm qemu qemu-kvm lrzsz
bridge-utils libvirt-bin virtinst python-libvirt virt-manager virt-viewer).
2. In Windows, log into the KVM host, enter the following command to create a directory
which will be used to store qcow2 file.
sudo mkdir /images/release/
3. In this directory, enter the following command, a dialog box will prompt.
rz
4. In the dialog box, browse your computer and select the qcow2 file. The files will be
uploaded to the above directory of KVM host.
6. If there is an qcow2 file in the file list, it means file is uploaded successfully.
Deploy vHSM 33
Step 2: Creating a virtual bridge
If the vHSM wants to access to external networks, you should create a virtual bridge on the KVM
host, and then place the host's two interfaces i.e. eth0 and eth1 under the virtual bridge. Once
vHSM is installed successfully, each interface becomes a virtual bridge, and automatically con-
nects to a vnet interface of KVM. So, when you install the qcow2 file, place the vnet interface of
KVM under the new created virtual bridge, then the external networks can be accessible.
1. In the root directory of KVM host, enter the following command to create a virtual bridge.
sudo brctl addbr br0
3. Modify the IP address of eth0 or eth1 to arbitrary one, then assign the original IP address of
eth0 or eth1 to the virtual bridge interface.
sudo ifconfig eth0 ip-address netmask netmask
sudo ifconfig br0 ip-address netmask netmask
4. In Linux, use command brctl show to show virtual bridge and interfaces.
Enter into the Linux graphical interface, to install and start vHSM, use the following steps:
Deploy vHSM 34
1. Open Virtual Machine Manager.
2. Click the icon which is used to create a new virtual machine, and set as shown below.
Deploy vHSM 35
3. Browse the file system of KVM host and select the qcow2 file in step 1.
Deploy vHSM 36
5. Choose Memory and CPU settings.
6. Set the virtual machine name, and check the Customize configuration before install check
box, then select virtual bridge.
Deploy vHSM 37
7. Select the IDE Disk 1 tab, then set Disk bus and Storage format in the right page.
8. Select the Boot Options tab, then check SATA Disk 1 in the right page.
9. Add the vnet interface to the virtual bridge created in step 2 and set device model.
Deploy vHSM 38
10. Create a virtual network interface and add it to the virtual bridge created in step 2.
Please refer to Visiting WebUI of vHSM in Installing vHSM on VMware ESXi chapter.
Disk Expansion
Take the vHSM deployed on KVM server as an example, take the following steps:
Deploy vHSM 39
1. powering off the virtual machine and click open.
2. Click the icon which is used to display the dedails of virtual machine.
Deploy vHSM 40
3. Click Add Hardware to create a new disk.
4. In the Add New Virtual Hardware dialog, set the disk capacity by requirement, and then
click Finish .
Deploy vHSM 41
5. Click the icon which is used to start the virtual machine.
6. Wait for a while, When the prompt shows the command line interface below, enter default
username and password to log in vHSM.
8. Restart vHSM.
Deploy vHSM 42
Deploying HSM Management Environment
To deploy HSM management environment, take the following steps:
2. Configure options related to HSM management on Hillstone devices, and make sure HSM
can recognize the devices.
Completing the above configurations, you can centralize device management on HSM.
l Configure settings on Hillstone devices. Hillstone devices will automatically register them-
selves to HSM when the network is connected between HSM and Hillstone devices.
l Configure settings on HSM to add Hillstone devices. You can add single device or multiple
devices.
Deploy vHSM 43
Notes:
l HSM will get all the VSYS devices of the physical device to manage them
when registering.
l After the registration is complete, the zero configuration IPS rules and the
zero configuration anti-virus rules of IPS devices will not appear in the HSM
system until the implementation of importing configuration.
1. Log into StoneOS. Select System > HSM from the menu bar.
l HSM Agent: Select the Enable checkbox to enable HSM agent, i.e., allowing HSM to
manage the device.
l HSM Server IP: Specify the IP address of the HSM. This IP address cannot be
0.0.0.0, 255.255.255.255 or multicast address.
l HSM Server Port: Specify the port number of HSM. The value range is 1 to 65535,
the default value is 9090. For StoneOS 4.5R4 and higher versions, port number 9091
is recommended.
l HSM Password: Specify the password for accessing HSM. HSM authenticates the
device using this password. The value is 1 to 31 characters, the default value is
123456.
Deploy vHSM 44
l OK: Click this button to save the settings and make the settings take effect.
3. With the above options configured, the device can register to the accessible HSM in the net-
work, and be managed by HSM.
To configure settings on HSM to add Hillstone devices, take the following steps. You can add
single device or multiple devices.
1. Select Device > Device Management, and enter the Device Management page.
2. Click the triangle icon ( ) next to the Add Device button and select Add Single
Device from the drop-down menu. The Add Multiple Devices dialog pops up.
l Access Protocol: Specify the protocol for the connection between HSM and
the device. Enter ssl to use the SSL protocol or enter telnet to use the Telnet
protocol. If not specified, HSM will use SSL by default.
Deploy vHSM 45
l SSH Port: Specify the SSH port number. SSH port number is not only used for
adding devices, but also for deploying a batch of rules, configuring tickets and
inspecting devices.The value range is 1 to 65535. The default value is 22.
l Geographic Location: Specify the geographic loaction of the device, and select
the province, city and district from the drop-down list.
1. Select Device > Device Management, and enter the Device Management page.
2. Click the triangle icon ( ) next to the Add Device button and select Add Multiple
Devices from the drop-down menu. The Add Multiple Devices dialog pops up.
3. Click Download Device Info File Template. The Save As dialog appears.
l Protocol: Specify the protocol for the connection between HSM and the
device. Enter ssh to use the SSH protocol or enter telnet to use the Telnet pro-
tocol. If not specified, HSM will use SSL by default.
Deploy vHSM 46
6. Save the changes and close the template.
7. In the Add Multiple Devices dialog, click Browse. The Open dialog appears.
8. Locate the modified template and click OK. HSM starts to load the template.
9. After loading the template, click Upload. HSM starts to read the template and add the
devices in it to HSM. If failed to register one device, all devices in the template will
be failed to be registered. To view the error information, hover over the exclamation
mark ( ) in the Status column.
When the properties of the IP address, username, password and so on change, you can edit device
and modify property values. Take the following steps:
1. Select Device > Device Management, and enter the Device Management page.
3. Click Edit Device in the toolbar and the Edit Device dialog pops up.
You can delete the related device when there's no need to manage the specified devices. Take the
following steps.
Deploy vHSM 47
1. Select Device > Device Management, and enter the Device Management page.
3. Click Delete Device in the toolbar, and the device will be deleted when you click OK in
the pop-up dialog.
You can manually register the device when the device is in an offline state or error state. You can
check the link state between the Hillstone device and HSM, as well as make sure that the device's
IP address, login username and password are correct to make device register in HSM successfully.
Take the following steps:
1. Select Device > Device Management, and enter the Device Management page.
3. Click Register Device in the toolbar and the device will be registered on HSM. You can
view the registration result of the device according to the displaying of status.
l official version:After being activated, the system becomes into an official version. By
default, the official version can manage 15 devices.
l trial version:If not being activated, vHSM is a trial version. The trial version only can manage
three devices. You can use trial version for 30 days.
Within the time limit, you can use all the functions of vHSM. After the trial version expired,
functions including configuration management, task management, alarm management and log
management are not supported, however, the system can still collect logs.
Upgrading Method
To upgrade to official version, please take the following steps:
Deploy vHSM 48
1. Log in vHSM via WebUI.
2. Select System > License > System Activation to enter the Activation Guide page. Click
Add in the pop-up dialog box.
3. Enter the SN registration code(please contact salesperson to acquire), then click Next.
5. Click Next.
If online activation is selected, the Online Activation page pops up and the system will be
activated automatically.
If offline activation is selected, please copy the code in step 1 in Offline Activation dialog
box, then visit vHSM activation system(activation.hillstonenet.com) and paste the code to
the text box. Click the Activate button, the activation code will be displayed in the below
area. Paste the activation code to the step 2 text box in Offline Activation dialog box, then
click Activate.
If you want to apply and install an official license, please refer to Licensing vHSM.
Notes:
l When not being activated, the system will display the remaining time dynam-
ically in the upper-right corner of the WebUI page. Click on the link to enter
the Activation Guide page.
Deploy vHSM 49
Upgrade Guideline for vHSM
When vHSM can work normally, the maximum number of the devices that can be managed by
vHSM is determined by the installed licenses. The maximum number of vHSM is different from
each other, so the hardware resources which vHSM needs is different. For more information, see
"Recommended Configuration of vHSM".
When log in to vHSM via WebUI, if the current hardware configuration does not reach the recom-
mended configuration, the following prompt box will pop up.
l If vHSM is installed on a VMware ESXi server, for more information about upgrading hard-
ware, see Installing vHSM on VMware ESXi > Disk Expansion.
l If vHSM is installed on a VMware Workstation host, for more information about upgrading
hardware, see Installing vHSM on Workstation > Disk Expansion.
l If vHSM is installed on a KVM host, for more information about upgrading hardware, see
Installing vHSM on KVM > Disk Expansion.
l If vHSM is installed on on Amazon Web Services(AWS), for more information about upgrad-
ing hardware, see Installing vHSM on AWS > Disk Expansion.
Deploy vHSM 50
Deploy vHSM 51
HSM WebUI Layout
This chapter introduces the WebUI layout of HSM, including the level-1 navigation pane, login
information, task panel and alarm & message.
The following is the layout picture of HSM WebUI:
Login Information
In the Login Information part, you can check the name of current login user. Click the user name,
you can view and edit the information of current user, as well as exit HSM.
Option Description
Exit HSM
Click the user name and Log off, then you will exit HSM system.
About
Click the icon, and the About dialog pops up. Click Help, and the page will redirect to the
Help page.
Task Panel
HSM uses tasks to track the system operations that need to know the running status and the run-
ning results. When the system executes the task, the related logs will be generated, and you can
learn the detailed task information and task failure reason from the logs. To view the tasks, click
the task panel at the bottom of the page. The task panel includes two parts: toolbar and task list.
In the toolbar, you can execute the following operations:
buttons.
l Select the Type, Status and Task ID from the drop-down list at the right corner of the task
panel, and the filtered tasks will be displayed in the list.
In the task list, you can view the Task ID, Type, Status, Create Time, Run Time, Result, Oper-
ator and User name.
Option Description
Result Displays the result of task. You can view the result via the
following methods:
Operator Click the icon to view the logs of the task Click the
l Pre-defined Panel
l User-defined Panel
Pre-defined Panel
In the Dashboard page, there are 4 pre-defined panels: Overview, VPN, Traffic and Security.
Overview
In the Overview panel, you can view the System Statistics, System Information, System
Resources, Device Traffic Ranking TOP10, Last 60 Minutes Threat Type Ranking TOP 10, Last
60 Minutes CPU Utilization Ranking TOP 10, Last 60 Minutes Memory Utilization Ranking TOP
10, Log Tread (Last 24 Hours) and the time axis.
Dashboard 57
System Statistics
In the System Statistics, you can view the following statistics in the format of doughnut and the
statistics data refresh automatically every 10 minutes.
l All Devices: Displays the distribution of devices types. The number in the center of dough-
nut means the total managed devices, and the legend under the doughnut displays the device
types. Hover the mouse over the doughnut to view the number of the specified device type.
l Online Devices: Displays the distribution of online devices. The number in the center of
doughnut means the total online devices, and the legend under the doughnut displays the
device types. Hover the mouse over the doughnut to view the number of specified online
devices.
l Last 60 Minutes Alarms: Displays the distribution of alarm severity. The number in the center
of doughnut means the total alarms in the last 60 minutes. Hover the mouse over the
Dashboard 58
doughnut to view the number of specified alarm severity. Click the specified severity and the
page will redirect to the Alarm page.
l Last 60 Minutes Threats: Displays the distribution of threat types. The number in the center
of doughnut means the total threats in the last 60 minutes. Hover the mouse over the dough-
nut to view the number of specified threat type. Click the specified threat type and the page
will redirect to the Log page.
System Information
In the System Information, you can view the following statistics and the statistics data refresh
automatically every 10 minutes.
l License Devices: Displays the number of firewall devices that HSM can manage.
l Estimate the remain storage days of the disk: Displays the estimate the remain storage days of
the disk. According to the usage of the used capacity of the disk, system estimates the num-
ber of days of use of the remaining capacity of the disk.
System Resources
Dashboard 59
l Click , and view the resources utilization of the latest day in the line chart. Select the Show
Legend check box to view the legend of the utilization of CPU, memory and disk. The stat-
istics data refresh automatically every 10 minutes.
l Click , and view the resources utilization in the real time. The statistics data refresh auto-
In the Device Traffic Ranking TOP10, you can view the traffic ranking of the manged devices in
the past 1 minute. The statistics data refresh automatically every 1 minute.
Click and to switch statistical graph between table and bar chart.
In the Last 60 Minutes Threat Type Ranking TOP 10, you can view the threats ranking in the last
60 minutes. The ranking information refresh automatically every 10 minutes.
Click and to switch statistical graph between table and bar chart.
In the Last 60 Minutes CPU Utilization Ranking TOP 10, you can view the CPU utilization rank-
ing of the managed devices in the last 60 minutes. The ranking information refresh automatically
every 10 minutes.
Click and to switch statistical graph between table and bar chart.
In the Last 60 Minutes Memory Utilization Ranking TOP 10, you can view the memory util-
ization ranking of the managed devices in the last 60 minutes. The ranking information refresh
automatically every 10 minutes.
Dashboard 60
Click and to switch statistical graph between table and bar chart.
In the Log Tread (Last 24 Hours), you can view the log receiving rate of system at different times
in the last day. When the log increase rate continues to be too large, causing the accumulation of
log information, system will automatically generate a log accumulation alarm, which you can view
in the main window of Alarm> Alarm Search.
Time Axis
You can check the latest event messages in the time axis from top to bottom. The events mes-
sages refresh automatically every 1 minute. You can check the messages of the latest week at
most.
l Click the button at the upper-right corner to hide the time axis and click the button to
display it.
l Hover the mouse over the message, and you can view Time, Type, Severity, Count and
Detail. Click View Detail and the page will redirect to the corresponded function.
Dashboard 61
l You can also execute following operations on the time axis:
2. Select the type and click Edit to change the Icon, Color and Ignore for the type. If
Ignore for the type is selected, the type of messages will be hided in the time axis.
3. Click OK.
4. To restore to the default settings for the selected type, click Reset.
l You also can right-click the icon before the event message to select the following operations:
l Ignore this type: Hide the selected event type from the time axis.
Dashboard 62
l Settings: Edit the Icon, Color and Ignore for the event type. To restore to the default
settings for the selected type, click Reset.
l You can click the button and button to slide the time axis and click the but-
VPN
In the VPN panel, you can view the typology of tunnels. For the detailed steps, please refer to
VPN > VPN > Topology.
Traffic
In the Traffic panel, you can view the Last 5 Minutes App Traffic Ranking TOP10 and Last 5
Minutes User Traffic Ranking TOP10.
Dashboard 63
Last 5 Minutes App Traffic Ranking TOP10
In the Last 5 Minutes App Traffic Ranking TOP10, you can view the application ranking by
traffic in the latest 5 minutes. The ranking information refresh automatically every 1 minute.
Click and to switch statistical graph between table and bar chart.
In the Last 5 Minutes User Traffic Ranking TOP10, you can view the users ranking by traffic in
the latest 5 minutes. The ranking information refresh automatically every 1 minute.
Click and to switch statistical graph between table and bar chart.
Security
In the Security panel, you can view the Last 60 Minutes Attacker Ranking TOP10 and Last 60
Minutes Victim Ranking TOP10.
Dashboard 64
Last 60 Minutes Attacker Ranking TOP10
In the Last 60 Minutes Attacker Ranking TOP10, you can view the ranking of attack sources in
the past 60 minutes. The ranking information refresh automatically every 1 minute.
Click and to switch statistical graph between table and bar chart.
In the Last 60 Minutes Victim Ranking TOP10, you can view the ranking of attack destinations in
the past 60 minutes. The ranking information refresh automatically every 1 minute.
Click and to switch statistical graph between table and bar chart.
User-defined Panel
You not only can view the default Overview, VPN, Traffic and Security panels, but also can cus-
tom a panel and add widgets as needed.
Dashboard 65
Creating the User-defined Panel
To create a custom panel, take the following steps:
1. Click the button on the right of the panel line and enter the name of the newly created
Notes:
l At most 10 tabs can be displayed in the panel line.
l You can change the order of panels, while the Overview panel should always
be the first.
2. Click OK.
Dashboard 66
l Click the button, and a new window will be opened in the browser.
You can view the specified panel in the new window without logging to HSM again.
l Click the button, and view the specified panel in the full screen. Click
1. Select one panel, click on the bottom, and the Add Widget dialog pops up.
Dashboard 67
Utilization Ranking and Memory Utilization Ranking.
If you need to add a user-defined widget, select the Custom tab. The data that can be coun-
ted include traffic, threats and logs. You can specify the statistic fields of traffic, threats or
logs, and the ranking of the statistic fields will be displayed on the panel.
Option Description
Data Source
Data Types Select the data type from the drop-down list,
including traffic, threat and log.
Dashboard 68
Option Description
Statistical Fields Specify the object that will be counted for rank-
ing.
Statistical Graph
3. Click OK.
Dashboard 69
Notes:
l At most 8 widgets can be displayed in each panel.
l You can change the location of widgets except System Statistics and time
axis.
Tool Bar
Click the tool bar of the widget to edit the widget:
l Graph Type: Select the graph type, including pie chart( ), line chart( ) and bar chart( ).
l Edit: Click the button to edit the title and graph type.
l Resize: Click the button and select the size of widget as needed.
Dashboard 70
Introduction to System Management
Configurations related to HSM system management include:
l System Management
l Authentication Settings: Specifying the mode of authenticating users who logs in HSM.
l AAA Server: Configuring the AAA server , including the server name, type, address,
port, and key.
l Trusted host: Configuring IP range of the host which is allowed to log in or manage
HSM.
l Date & Time: Configuring HSM system date and time. HSM supports synchronization
with NTP servers. HSM system time can be referenced by other modules, such as mon-
itor, alarm, log, upgrade, etc.
l Service Configure: Specifying the port number for accessing HSM via Web.
l Monitor Configuration: Enabling or disabling the Monitor function. The monitor func-
tion is disabled by default because it consumes more system performance. When the
monitor function is disabled, monitor, alarm, report, and monitor charts shown in the
l System Monitor: Viewing system status, including CPU utilization, memory utilization, and
disk utilization.
l Configuration Management: Back up configuration and running data for HSM system.
l Upgrade: Upgrading or rolling back HSM system, or restoring to the factory defaults.
l Email: Configuring parameters for the Email server that is used to send alarm mails.
l Proxy Server: Configuring parameters for the proxy server that is used to upgrade signature
databases.
l SMS Modem Configuration: Configuring parameters for sending SMS and viewing SMS
Modem status information, etc.
l Diagnose Tools: Testing the devices connection status with HSM, including DNS query,
Ping, and Traceroute.
l Language: Changing the system language. Chinese and English are supported.
l Power
l Shutdown: Click this menu item to shut the HSM device down.
1. System admin can specify privileges for every user, and the privilege can be accurate to
every HSM function module(eg: Device, Configuration, Report).
2. A user can have one or more roles, and a role can be given to one or more users.
After login the HSM system administrator can use HSM to manage Hillstone devices. HSM users
consist of super administrator and administrator. Super administrator has all the privileges of a sys-
tem administrator, which can create/delete/enable/disable administrator and specify role/device
resources for administrator. The username and password for the default super administrator of
HSM are admin and hillstone respectively.
By default, HSM predefines three roles: system administrator, operator, log auditor. Predefined
role cannot be modified and deleted. And user-defined role can be created according to your
need. The followings are descriptions about predefined role:
l Creating a User
l Editing a User
l Enabling/Disabling a User
l Restting Password
l Creating a Role
l Deleting a Role
Creating a User
Only the user who has the privilege of a system administrator can create a user. To create a user,
take the following steps:
2. In the User tab, click New. In the User dialog, configure the following options:
l Password: .Specify the password for the user. It should be 8-32 characters, including
numbers, English characters(case sensitive), and special characters. The default pass-
word is hillstone, and you can change the password as needed.
l Enable: Specify the status of the new user. By default the new user is enabled. Clear
the checkbox to disable the user, and the user will not be able to log into HSM.
l Timeout (min): Specify the timeout for the user. If the user did not configure any
option after timeout, the system will log off.
3. Only when you specify "local" as the Authorization, you can click Privilege tab and con-
figure the role for the current user. Specify the role in the Role text box, and then select
which device the user can manage in the Resource Device box. When the selected role is
not the system administrator, select the device group which you can manage. Then once a
new device is added into the device group, you can get the management privilege for it auto-
matically.
Note: When the check box behind the device group is selected, you will lose the privilege
of the device once it is moved from the group. When the "All" check box is selected, you
will still have the privilege of the device even it is moved from the group.
Also, you can create a new user by a faster way, i.e., copying. To create a user by copying, take the
following steps:
2. Click Copy in the toolbar. In the User dialog, all the configurations of the selected user is
copied. You only need to configure the name for the new user, and modify other options as
needed.
3. Click or
button, and the click OK in the Ok dialog box to enable or disable this function for the
selected users in batches.
Editing a User
To edit a user, take the following steps:
3. Click Apply to save the changes. If needed, click Previous/Next to edit other users.
Deleting a User
To delete a user, take the following steps:
1. In the User tab, select a user by selecting the corresponding checkbox from the user list.
Enabling/Disabling a User
The disabled users will not be able to log into HSM. To enable/disable a user, take the following
steps:
1. In the User tab, select a user by selecting the corresponding checkbox from the user list.
Resetting Password
This operation will reset the user password to the default password hillstone. Only the default
administrator admin can reset password by one of the following methods:
l In the User tab, click the username you want to edit. In the Details dialog, click Reset Pass-
word.
1. After entering the device management IP in the browser to open the login page and enter
the user name and password.
2. In the prompt box, select the Change the Default Password" and click OK.
4. Click OK.
Creating a Role
To create a role, take the following steps:
2. In the Role tab, click New and the Add Role dialog pops up. Options are described as
belows:
l User: Click the text box and select which users the role belongs to.
l Privilege: Specify the privileges for the role on each HSM modules.
Also, you can create a new role by a faster way, i.e., copying. To create a role by copying, take the
following steps:
1. In the Role tab, select a role by selecting the corresponding checkbox from the role list.
2. Click Copy in the toolbar. In the Add Role dialog, all the configurations of the selected role
is copied. You only need to configure the name for the new role, and modify other options
as needed.
Deleting a Role
Predefined role cannot be deleted. The user who has the system administrator privilege can delete
user-defined roles. And once the role is deleted, the users who has specified to the role will lost
all the privileges of the role.
To delete a role, take the following steps:
1. In the Role tab, select a role by selecting the corresponding checkbox from the role list.
User Authentication
User authentication is used to identify if the logged in user is legitimate. If passing the authen-
tication, you can login and operate HSM successfully. If not, you will not be able to login. HSM
supports the following authentication modes:
To configure the authentication mode for HSM, take the following steps:
l Select Yes, users not existed in the local server will authenticated by the selected
external AAA server.
l Select default authentication server: Select an external AAA server for the
authentication.
l Default User Role: Specify a configured role. When the user authenticated by
an external AAA server is not assigned a role, system will assign the specified
role for the user.
l Default User Role: Specify a configured role. When the user authenticated by
the local AAA server is not assigned a role, system will assign the specified role
for the user.
Notes:
l After the successful modification of the authentication mode, the current
online users will be offline, and you need to login again.
l In local authentication mode, all local users will be displayed in the user list;
in Radius authentication mode, users who have been authenticated suc-
cessfully by the RADIUS server will be displayed in the user list, the user
name format is "user name" + "@" + "IP address of RADIUS server".
AAA Server
AAA is the abbreviation for Authentication, Authorization and Accounting. Details are as fol-
lows:
l Accounting: Records the fees users should pay for their network resource usage.
Here in HSM system, authentication supports the following 3 types of AAA server:
Option Description
Server Name Specify the server name. You can specify at most 31 char-
acters.
Port Specify the port number of the AAA server. The value
range is 1 to 65535.
Link Test Click Link Test button, system will verify whether the
configured AAA address is available. If available, the sys-
tem will prompt AAA server reach. If not, the system
will prompt AAA server can not reach
3. Click OK.
2. By default, the trusted IP range is 0.0.0.0/0, which means all hosts are trusted.
l Host Name: Specify the name for the trusted host. It can be null.
l IP Address: Specify the IP address or IP range for the trusted host, eg:10.188.1.10 -
10.188.1.15, or 192.168.10.0/24
2. Select a trusted host by selecting the corresponding checkbox from the list, and then click
Edit or Delete.
2. Select appropriate time zone from the HSM System Time Zone drop-down list. If the selec-
ted time zone uses DST, the "Automatically adjustment of daylight time clock" check box
will be selected automatically.
3. The current date and time is shown in the HSM System Time box. If you still need to
modify the date or time, type correct date and time into the box.
5. The changed time will be applied to new data and time of existing data won't be updated. In
the pop-up Warning dialog , click the yes button to confirm the update.
If the time zone is adjusted from east to west, the time of new business data may be the
same as the existing business data.
To configure HSM system time by synchronizing with an NTP server, take the following steps:
1. Select System > Device Management > Date & Time from the Level-1 navigation bar.
Notes: Configure the system time properly during the initial setup, and if possible,
do not change the system time thereafter. Otherwise, modules that rely on system
time (such as report, log) will be affected.
l IP Address: Specify the IP addresses for eth0 and eth1 according to network topo-
logy.
l Netmask: Specify the netmasks for eth0 and eth1 according to network topology.
l Preferred: Specify the IP address for the preferred DNS server of HSM.
l Backup: Specify the IP address for the backup DNS server of HSM.
Service Configuration
HSM supports to modify service configuration, including WEB port number, REST API, REST
API Token, data transmission encryption protocol, and SSH and syslog service status.
Contents related to service corresponding configuration include:
l WEB PORT
l REST API
l Encryption Protocol
l Service Status
l SNMP
WEB PORT
You can modify the port number used to access HSM by Web, in order to ensure the system
security.
To configure the port number, take the following steps:
l HTTP WEB Port: Specify the port number used to access the HTTP service for
HSM. The default value is 80. The value ranges from 1025 to 65535 except 80,
wherein 2003-3003, 3306, 6514, 8005, 8080, 8161, 8443, 9000, 9090, 9091, 9092,
61616, and 61617 are preoccupied by system. The preoccupied port numbers cannot
be configured.
l HTTPS WEB Port: Specify the port number used to access the HTTPS service for
HSM. The default value is 443. The value ranges from 1025 to 65535 except 443,
4. Click OK.
Notes: After the web port number is modified successfully, the web service will be
restarted, and you need to access the web service by using the new port number
after the restart.
REST API
System supports the ticket function to allow accesses from users with non-certified tokens
through API. You can deliver configuration to the HSM system through API, review the con-
figuration in the form of tickets, and deploy the tickets to the corresponding devices. HSM
provides a unified interface for configuring IP forbidden policies, and deploys them to firewall
devices to block access from specific IP addresses.
To configure the REST API, take the following steps:
l Ticket (Do not need Token): Click the button to allow users with non-cer-
l IP Forbidden: Click the button to allow users whose tokens have not expired
to deliver the IP Forbidden policy configuration to the HSM system. In the Device
that enable IP Forbidden list, you can view the status of managed devices, including
disabled, enabling, failed to enable and enabled. Administrators whose tokens have
not expired can deliver the configuration through API to the devices that have
enabled the function.
l Click Add Device, and in the Add Device dialog box, select the online device
that needs to enable the IP Forbidden function, and then click OK.
l Click Batch Delete to disable the IP Forbidden function of one or more selec-
ted devices.
l Click the button to re-enable the IP Forbidden function for the device.
l Click the button to disable the IP Forbidden function for the device.
2. Select REST API Token, and enter the REST API Token page.
l Click here above the list to generate the token of the current administrator.
erate the token of the current or specified administrator. In the pop-up Generate
Token (admin) dialog box, specify the period of validity the token, including 1 day(s),
7 day(s), 30 day(s), 90 day(s) and custom.
l Click the button or the button in the Operation column to copy the
l Click the button or the button in the Operation column to delete the
Encryption Protocol
You can configure the encryption protocol used when transmitting data between the HSM system
and firewall devices, including FTPS and HTTPS. This configuration is only valid for firewall
devices of 5.5R7F6 and above.
To configure the encryption protocol, take the following steps:
l FTPS: Click the radio button, and data will be transmitted between the HSM system
and firewall devices over FTPS. FTPS is enabled by default.
l HTTPS: Click the radio button, and data will be transmitted between the HSM sys-
tem and firewall devices over HTTPS.
4. Click OK.
Service Status
System supports to configure the service status of SSH and syslog.
To configure the system service status, take the following steps:
l SSH Service Status: Click the Enable or Disable button to enable or disable the func-
tion of logging in to HSM via SSH. With the function enabled, you can type the port
number into the SSH Port text box. The default value is 22. The value ranges from
1025 to 65535 except 22, wherein 2003-3003, 3306, 5029, 6379, 6514, 8005, 8080,
8161, 8443, 9000, 9090, 9091, 9092, 9093, 9100, 9101, 9200, 61616, and 61617 are
preoccupied by system. The preoccupied port numbers cannot be configured.
l Syslog Service Status: Click the Enable or Disable button to enable or disable the sys-
log function. With the function disabled, system will no longer receive log data from
managed devices.
4. Click OK.
SNMP
System supports SNMP function so that HSM can receive the operation request from the Net-
work Management System and give the corresponding information of itself. Now, system sup-
ports SNMPv1 protocol and SNMPv2c protocol. Both SNMPv1 protocol and SNMPv2c protocol
use community-based authentication to limit the Network Management System to get device
information.
Hillstone Networks provides private MIB which includes the system information of HSM, such
as serial number, software version, CPU utilization, etc.
Configuring SNMP
l SNMP Version: Indicates that HSM supports SNMPv1 protocol and SNMPv2c pro-
tocol.
l SNMP Port: Indicates that the port number used to provide SNMP service is 161.
l Community: Specify the community. Only when the SNMP message includes the spe-
cified community, the HSM information is available.
l Privilege: Indicates that the Network Management System only can read the HSM
information.
4. Click OK.
Resource Management
l Disk Management
Disk Management
Disk management refers to the configuration of cleanup threshold of disk in order to manage the
storage space of system. When the actual storage exceeds the specified threshold, system will dis-
able monitor function and start to clear monitor and log data. You can manually clear the log or
monitor data as requried.
1. Select System > System Management > Resource Management, click disk management tab.
2. Click Edit button in the "Auto Cleanup" module, and then enter the threshold in the text
box. The range of this value is 60% to 90%. When the storage exceeds the specified
threshold, system will disable monitor function and start to clear monitor and log data. Sys-
tem will first clean the monitor data 8 hours ago. If the actual disk utilization is still not
lower than the specified threshold, system begins to clean the log data that has been saved
for a long time.
Note: System keeps log information for at least 1 day.
Manual Cleanup
2. In the "Auto Cleanup" module, select the data which needs to be cleaned from the Select
cleaning content drop-down list.
l Log: If "Log" is selected, you need to specify the type of log to be cleaned, including
online logs within the specified time and offline logs.
l Monitor: If "Monitor" is selected, system will cleanup monitor data generated 8 hours
ago.
3. Click Manual Cleanup button, and click OK in the dialog. System will begin to clean the
specified log data or monitor data.
1. Select System > System Management > Resource Management, click MySQL memory man-
agement tab.
l The current physical memory is less than or equal to 8G, you can select the default
value, 1G or 2G. The default value is 3072M.
l The current physical memory is greater than 8G and less than or equal to 16G, you
can select the default value, 2G or 3G. The default value is 4068M.
l The current physical memory is greater than 16G, MySOL memory cannot be mod-
ified.
Distribute Management
For users who need to manage a large number of devices, one HSM cannot meet their require-
ments. To resolve the problem, you can use the distributed management function, which means
when you configure multiple HSM or HSA devices, you can specify one device as master device
and others as slave devices. With this function, you can view information of the slave devices and
their firewalls on the master device. It can alleviate the pressure of single HSM. The distributed
management includes standalone mode, master mode and slave mode.
l Master Mode: When one HSM device manages multiple HSM and HSA devices ,you can
view information of these slave devices and the firewalls managed by HSM, the current
device is the master HSM, and the mode is master mode. The master HSM cannot manage
firewalls directly. One master HSM can register up to 16 slave HSM devices and 16 slave
l Slave Mode: When one HSM device is managed by one master HSM, the current device is
slave HSM, and the mode is slave Mode. The slave HSM can manage firewalls directly. The
slave HSM can only be registered with the user of admin on the master HSM.
l Standalone Mode: The HSM device in the standalone mode or in the slave mode can man-
age the firewalls directly, while the standalone HSM cannot be registered on the master
HSM. The default mode is standalone mode.
Notes: When the master mode switches to the salve mode or standalone mode, the
association relationship between all users and devices under the master mode will
be cleared. When the salve mode or standalone mode switches to the master mode,
the association relationship between all users and devices under the slave mode or
standalone mode will be cleared too.
Switch Modes
To switch modes of the distributed management, take the following steps:
2. Select the mode check box that you need in the Distribute Management page.
3. Click OK to complete the switching of distributed management modes and jump to the
main Web interface of the corresponding mode.
1. Click Device > Distributed Devices to enter the Device List page.
3. Click Add Device, and configure parameters in the Add Device dialog.
Option Description
device.
4. Click OK .
Option Description
When the HSM system is in the master mode, system supports the following operations on
slave devices:
l Click Edit Device in the toolbar or in the list of corresponding item. In the pop Edit
Device dialog bos, you can modify port number、password and description of the slave
device.
l Click Delete Device in the toolbar or in the list of corresponding item to delete selec-
l Click Register Device in the toolbar or in the list of corresponding item to register the
l Select Name or Address in the drop down list of and enter keywords to
Monitor Configuration
To ensure the performance of HSM, HSM does not enable the monitor function for any device by
default. If desired, you can enable the monitor function according to your requirements. After
enabling the monitor function, the HSM performance will be affected. To ensure the adequate per-
formance, it is recommended that the number of monitored devices is less than 500.
To configure the monitor function on HSM, take the following steps:
2. To enable or disable the monitor function on HSM for certain devices, choose devices from
the device list, and then click Monitor Configure . The Monitor Configure dialog appears.
l Other: Enable or disable the network threat and network behavior monitor function.
l Priority: You can select Low, Middle, and High priority. When the monitor data
exceed system capacity, system will disable the monitor function of low priority
device, so as to ensure the monitor data of higher priority device can be processed.
l Click OK button, Monitor Configure dialog will be closed. save the settings. then
Update Configure progress bar disappears. Click OK button to close the dialog.
If enable monitor, system's performance will be affected. To ensure the normal operation of the
system, it is recommended that no more than 500 managed devices be monitored. Following func-
tions will be affected after the monitor function is disabled.
Module Details
Alarm Following alarm rules cannot take effect: VPN Tunnel Inter-
1. Log into HSM. Click System from the Level-1 navigation pane to enter the system page.
l Lock When Exceeded: Specify the maximum number of login failures for the same
user. The value range is 1-10 times.
l Lock Time: Specify the lock time after the maximum number of login failures is
exceeded. The value range is 1-440 minutes.
4. Click OK.
l Minimum Length: Specifies the minimum length of password. When the password
complexity is not configured, the value range is 4-16; when the password complexity
is configured, the value range is 8-16.
4. Click OK.
Viewing Status
System provides the following statistics of the monitored objects: the trend within a specified
time cycle, the current status, and other detailed information.
To view the status, select System > Device Management > Status Monitor.
l The line chart shows the trend of the monitored objects. Based on the specified time cycle,
HSM will take samples accordingly and display the trend in the chart. By default, HSM dis-
l The right chart displays the current status of the monitored objects. HSM will refresh the data
in every 5 minutes.
l View detail: Click the View link of each monitored object to view the detailed information.
You can view the column charts of the top 5 processes that occupy the CPU resources and
the memory resources individually, and the pie charts of all objects that occupy the disk. The
following chart displays the top 5 processes that occupy the memory resources.
l Predefined time cycle: Click Latest 1 Hour and then select a predefined one.
l Latest 1 Hour: Displays the statistics of each monitored object within the latest 1 hour.
HSM will take samples every minute.
l Latest 1 Day: Displays the statistics of each monitored object within the latest 1 day.
HSM will take samples every 10 minutes.
l Latest 1 Week: Displays the statistics of each monitored object within the latest 1
week. HSM will take samples every hour.
l Latest 1 Month: Displays the statistics of each monitored object within the latest 1
month. HSM will take samples every 6 hours.
l Custom time cycle: Click Latest 1 Hour and then select Custom. The Select Time dialog
appears. You can select the start time and the end time according to your requirements.
l If the custom time cycle is within 6 hours, HSM takes samples every minute.
l If the custom time cycle exceeds 6 hours and is less than 1 week, HSM takes samples
every 10 minutes.
l If the custom time cycle exceeds 1 week and is less than 6 months, HSM takes samples
every 6 hours.
l If the custom time cycle exceeds 6 months and is less than 1 year, HSM takes samples
every 24 hours.
3. Set the threshold for each object using one of the methods:
l Drag the slider. The exact value will update in the text box.
l Enter the value. The slider will move to the exact location.
4. Click OK to save the configuration settings and return to the System Status Monitor dialog.
The red line representing the threshold moves to the correct location.
For more information about configuring alarm rules, refer to Configuring the Alarm Rule.
According to the maximum number of managed devices, the recommended hardware con-
figuration is as follows:
l Memory: 16G
l CPU Thread: 4
l CPU Thread: 8
l Disk Capacity: 2T
l CPU Thread: 16
l Disk Capacity: 4T
l CPU Thread: 24
l Disk Capacity: 8T
With these facilities, HSM can quickly resume after accidental breakdown.
3. Specify the name of the backup file. By default, the file is named as backup_date_time, for
example, backup_201311171035.
After backing up the file, HSM lists this file in the list of the HSM System Configuration Man-
agement dialog. You can view the detailed information, including the file name, the size, the
backup time, the operated user, and the description.
2. Click the triangle ( ) next to the Restore button. Then select Selected File. The Restoring
To restore HSM system configurations to a local-saved file, take the following steps.
1. With the HSM System Configuration Management dialog active, click the triangle ( ) next
to the Restore button. Then select Local File. The Restoring window pops up.
2. Click the magnifying glass ( ) to locate the local file and then open it.
l When restoring a file backed up by the current HSM itself, the historical data of Mon-
itor, Log, and Alarm in HSM will remain the same.
l When restoring a file that is not backed up by the current HSM, the historical data of
Monitor, Log, and Alarm in HSM will be cleared.
4. After uploading the file, HSM analyzes the file and then starts to restore the file.
Option Description
Hello interval Specifies the Hello interval value. Hello interval refers
to the interval for the HA device to send heartbeats
(Hello packets) to other devices in the HA group. The
Hello interval in the same HA group must be identical.
Track Object System uses the track object to monitor the working
status of the device. Once the device cannot work nor-
mally, system will take corresponding measures imme-
diately. ping: type a legal IP address or domain name. If
the typed IP address or domain can be connected, it
indicates that the device is running normally. If not,
the master and backup device will switch.
HA Alarm Select the Enable check box. When the status of inter-
3. Click OK, and the HA Creating dialog will pop up. You can view the process of HA cre-
ating in the dialog.
Option Description
Wait for configuration You can view the result of the peer con-
of the peer and con- figuration and the connection between the local
necting to the peer device and peer device in system. You need to
configure the peer parameters before the HA
being built or when the HA is built in process.
You also need to make sure HSM has connected
with the peer device. Otherwise, it cannot be
connected successfully.
HA Establish Condi- You can view the result of checking if the con-
tion Checking dition of establishing HA is met in system.
HA Build Suc- You can view the result that whether HA is built
cessfully successfully.
System Upgrade
To upgrade HSM system, take the following steps:
3. Click Upload.
2. In the Upgrade page, click Rollback, and then click OK under the tag.
2. In the Upgrade page, click Factory Defaults, and then click OK under the tag.
Notes:
l When HSM manages the HA function of the managed devices, it supports
the upgrade of signature database of the managed devices. If the signature
databases of the master device and slave device are upgraded to different vis-
ions, the signature database of the master device will be synchronized to that
of the slave device.
Option Description
Local Click and select the IPS signature file , application sig-
l Official license: Controls the number of maximum devices HSM can manage.It is restrict to
time: within the validity period, vHSM supports system upgrading; when it expires, vHSM
can still manage the specified number of devices, but can not be upgraded to the higher ver-
sion after expiring date. If there are more than 15 to be managed, you can contact sales person
to purchase an official license.
l Time limit license: Controls the service time of HSM. After expiration, Hillstone will not
provide any upgrade or maintenance service for the HSM. If multiple time limit licenses are
installed, the service will expire on the latest date of the licenses.
l Professional trial license: System cannot provide the ticket management function when the
license expires.
l SDWAN license: Provides ZTP (Zero Touch Provisioning) function, including adding ZTP
device, adding VPN network and VPN map monitor etc. After expiration, you cannot add
ZTP devices, manage license and configure VPN network. The original services will not be
affected. The number of devices supported by the SD-WAN base license needs to be greater
than the maximum number of devices that can be managed by the HSM system for the license
to take effect.
l SDWAN trial license: System cannot provide the SD-WAN management function when the
license expires.
To expand the number of maximum devices HSM can manage or extend the service time, take the
following steps:
1. Apply for a license, i.e., generate a string for license application, and send to Hillstone.
2. Hillstone will generate a license file based on the string, and send to the applicant.
2. In the Apply for License tab, fill in the contents in the License Application section.
3. Click Apply.
4. Click Copy, paste the string to your Email and send to Hillstone.
Installing a License
To install a license, take the following steps:
3. Click Upload.
SMS Gateway
System supports to use SMS authentication when administraters login HSM. SMS authentication
is a kind of the two-factor authentication. When you login HSM via WebUI, you need to enter the
the received SMS verification code after entering the correct username and password.
Option Description
SMS Signature Specify the SMS signature applied from the Alibaba
Cloud platform, which will displayed in the text mes-
sage.
User Authentic- Copy the template in the grey text box and use it to
ation SMS Tem- apply for a template code on the Alibaba Cloud plat-
plate Code form. After it is verified by the Alibaba Cloud plat-
form, you will get a template code. Enter the template
code in the text box.
Test Phone Num- This function is used to test if the Alibaba Cloud can
ber send message successfully. Specify a phone number in
the text box, and then click Test. If it succeeds, the
phone using the specified number will receive a text
message.
Tips: You need to configure the correct DNS before
testing.
l Testing Recipient: Specify the recipient that is used to test the Email account. Click
Test to test if Email can be sent by the Email account successfully.
2. Click New, the Add new network setting dialog pops up.
l Name : Specify the name of the proxy server. The value range is 1 to 31 characters.
l IP : Specify the IP address or domain name for the proxy server. The value of domain
is 1 to 64 characters.
l Port: Specify the port number for the proxy server. The value range is 1024 to 65535.
3. Click OK.
l Select proxy servers , and click , you can modify the configuration in the Modify net-
Option Description
Maximum Defines the maximum message number the modem can send in
sending num- one hour, the value ranges from 1 to 1000.
ber per hour
Maximum Defines the maximum messages number the modem can send
sending num- in one day, the value ranges from 1 to 1000.
ber per day
Testing SMS
To test if the message sending works, you can send a test text to a mobile.
To send a text message to a specified mobile number:
Log
HSM system supports to back up, import, clean, filter and forward logs. Before backing up or
importing logs, you need to configure the FTP server settings.
l FTP Server Configuration: Specify a FTP server for storing the backed-up logs or storing the
logs that is for import.
l Log Backup: Back up logs and store them in the FTP server.
l Log Clean: Clear the offline logs or the running logs within the specified period.
l Log Forwarding: Forward logs to the FTP server or third-party syslog server.
l Log Filtering: Configure the filter conditions, system will receive the managed devices' logs
that meet the conditions.
l Config Name: Specify the FTP server name. You can also enter other names to mark
this entry. You can enter at most 20 characters.
l Address/Port: Specify the IP address and the corresponding port of the FTP server.
l User name: Specify the user name that has access right to the FTP server.
l Path: Specify the path of the directory in the FTP server for storing logs. Use "/" as
the separator.
l passive: The FTP server passively receives the request initiated by HSM.
l Server Type: Specify the operating system of the FTP server as Auto-decection, Unix
or Windows.
l Timeout: Specify the timeout value of data transmission for the FTP server, after
which system will transfer again. If a file fails to be transferred more than 10 times,
system will no longer upload the file. The value range is 1 to 30 seconds. The default
value is 5 seconds.
5. After configuring the settings, click Detection to verify the connection between HSM and
FTP server. After testing successfully, click OK to save this entry and return to the FTP
Configuration dialog. This entry is displayed in the FTP server list. You can also click OK
directly instead of clicking Detection. HSM will not verify the connection and save this
entry to the FTP Configuration dialog. Click the Detection link in the Detect column to
verify the connection.
If you want to edit the FTP server settings, select an entry from the FTP server list and then click
Edit in the toolbar. To delete the undesired FTP servers, select the entries from the list and then
click Delete in the toolbar.
Log Import
HSM system supports the import and viewing logs. To import logs, take the following steps:
l FTP Server: From the drop-down list, select the FTP server where you store the log
files. Then the corresponding FTP server settings are displayed. You can click Detec-
tion to verify the connection between HSM and the FTP server. If you want to
modify the FTP server settings, click FTP Config.
l Choose File: From the drop-down list, select log files. You can select folders and/or
files. HSM supports the following file types: ZIP, TXT, and CVS.
3. Click Import to start the import task. The task progress will be displayed in task list. For
more informatin, see task.
Log Backup
HSM supports the backup of the logs. You can back up logs manually or automatically.
l For the backed-up logs, HSM can import them for viewing.
Manual Backup
l Log Type: From the drop-down list, select the log types to be backed up.
l FTP Server: From the drop-down list, select the FTP server where to store the log
files. Then the corresponding FTP server settings are displayed. You can click Detec-
tion to verify the connection between HSM and the FTP server. If you want to
modify the FTP server settings, click FTP Config.
3. Click Backup to start the backup task. The task progress will be displayed in task list. For
more informatin, see task.
Enable Auto Backup: Select the check box to enable backing up logs automatically func-
tion.
Interval: Specify the periodical backup cycle, including Every Day, Every Week, Every
Month.
Time: Specify the customized time for backing up logs automatically.
Backup Relative Time: From the drop-down list, select the number of days to be backed
up. Logs of the specifies days will be exported, 90 days at most.
FTP Server: From the drop-down list, select the FTP server where to store the log files.
Then the corresponding FTP server settings are displayed. You can click Detection to
verify the connection between HSM and the FTP server. If you want to modify the FTP
server settings, click FTP Config.
Delete date after backup: Select the check box to delete the specified date after backup.
3. Click OK to start the backup task. The task progress will be displayed in task list. For more
informatin, see task.
Log Clean
You can clean the offline/online/system logs stored in system. Log which has been cleaned can-
not be recovered. For more information about cleaning online or offline logs manually, refer to
Manual Cleanup.
To clean system logs manually, take the following steps:
l Click Delete button in the upper left corner of the list to clean the selected system
logs.
l Click Clear All Operation Log button in the lower left corner in the page to clean all
the system logs which is displayed for the current administrator.
Log Forwarding
HSM supports the forwarding of logs. You can forward the logs to the specified FTP/SFTP
server or third-party syslog server automatically.
2. Click the FTP Server tab and configure the following options:
Enable Auto Forwarding: Select the check box to enable forwarding logs automatically
function.
l %Y: year;
l %m: month;
l %d: day;
l %H: hour;
l %M: minute;
l %3i: file number, the length of it could be set, between 1 and 9. e.g: %3i means
001, 002, 003 .etc.
Forwarding Limit: Specifies the limitation for forwarding logs, including "No Limit","By
Size" and "By Count".
l By Size: Specify the size of a single file. The value range is 50 to 500MB;
l By Count: Specify the number of logs in a single file. The value range is 10 to
1000K.
Forwarding Interval: From the drop-down list, select the time interval of forwarding, 10
minutes or 60 minutes. If the forwarding limit is not selected or the specified forwarding
limit is not reached, system will forward the log according to the forwarding interval.
FTP/SFTP Server: Select the FTP server to store the forwarded log files from the drop-
down list, then the corresponding FTP server settings will be displayed. You can click
Detect to verify the connection between HSM and the FTP server, or click FTP Setting if
you want to modify the FTP server settings.
To forward logs to the third-party syslog server, take the following steps:
2. Click the Third Party Syslog Server tab and configure the following options:
Enable Third Party Syslog Server: If the check box is selected, system will forward logs to
the specified third party syslog server automatically once receiving new logs.
IP Address: Specify the IP address of the third party syslog server.
Port: Specify the port of the third party syslog server.
4. After the third party syslog server receives the logs forwarded by system, you can receive
the ID of devices which sent logs to system. If you want to search the corresponded name
and SN of source devices, log in to the system and click System > Log > Log Forwarding >
Third Party Syslog Server. In the Log Source List area, select Device ID from the drop-
To forward logs to the third-party syslog server, take the following steps:
Log Filtering
System supports to configure log filtering conditions, including "firewall", "log type" and "log
level". System will receive logs that meet the filtering conditions. To configure log filtering con-
ditions, take the following steps:
2. Click Firewall , Log Type and Log Level tab enter the corresponding page, and you can
select the log filtering conditions as needed.
Notes:
l If HSM system starts for the first time, or, system has not received
session log in the last three months after upgrading, system will not
select the "session log" by default.
l If system has received session log in the last three months after
upgrading, system will select the "session log" by default.
Diagnose Tools
During HSM managing the devices, diagnose tools can help you test network availability and dia-
gnose system errors qulickly. You can choose the tools according to your requirements.
To use HSM diagnose tools, take the following steps:
2. You can choose the tools according to your requirements, configure the following options:
l DNS Query : Specify the DNS domain name. Check the legitimacy of domain name,
and then the domain's IP address and fault messages will be displayed. If the DNS
server is not configured, a dialog will pop up to prompt.
l Ping: Specify the DNS domain name or IP address, click Test, and then the results of
ping will be displayed.
l Traceroute: Specify the DNS domain name or IP address, click Test, and then the res-
ults of traceroute will be displayed.
3. Click Test, and then the results will be displayed in the below text box.
l Device Configuration File Manage: The configuration file management function in HSM facil-
itates the management of configuration files located in different Hillstone Networks devices
and the management of configuration file's change history.
l User Management: HSM supports to manage the user information in the firewall devices.
l Device Inspection: HSM supports to inspect the device running status, license and signature
database, as well as to generate inspection report.
Device navigation pane allows you to navigate to the managed devices. Select a node from the
pane to display corresponding devices information in the main window. For example, if you select
a device group, all devices in the group will be displayed in the main window; if you select a
device, information about the device will be displayed in the main window. Click the icon in
the top-right corner of the device list to filter IPS device, WAF device, NGFW device, BDS
device, IDS device or ADC device. Enter the key words into the Name or IP or SN text box to
search the device quickly. Select the Favourite Only check box to display the favourite devices.
Information Bar
Option Description
Include Select the check box to display all the devices in the selected
Devices in group and all the devices in the sub-groups of the selected
Sub-groups group; clear the checkbox to only display all the devices in the
selected group.
Toolbar
Function buttons of the toolbar are described as below:
Option Description
Delete Device Click the button to delete the device(s) selected in the main
window.
Manual Specify the refreshing mode. Select Manual refresh from the
refresh drop-down list, and click Manual refresh to refresh the page
immediately; select a refreshing period from the drop-down
list to refresh the page at the specified interval.
Main Window
Managed devices and main information about the devices is displayed in the main window. Click a
device or device group in the device navigation pane to show corresponding information in the
main window. You can customize the columns displayed in the list from the Column drop-down
list. Columns of the list are described as below:
Option Description
New Sessions Shows the newly created sessions of the managed device.
Configuration Shows the last modified time of the configurations of the man-
Modified aged device.
Time
Uptime
Unread Warn- Shows the number of unread warnings related to the managed
ings device.
Packet For- Shows the packet forwarding rate of the managed device.
warding Rate
License Shows the license of the managed device. In the License List
dialog, you can view customer, type, valid time and other
information of the license.
Reboot log Shows the reboot log of the managed device. In the Log dia-
log, you can filter the operation result and protocol and then
view the information.
l Favorite Device
l Session Query
l Online Reboot
ZTP Configuration
Zero Touch Provisioning (ZTP) allows newly delivered or unconfigured devices to automatically
load version files, after they start. If a large number of devices are sparsely distributed across a net-
work, manually configuring these device results in poor device deployment efficiency. HSM
1. Select Device > Device Management, and enter the Device Management page.
2. Click the triangle icon ( ) next to the Add Device button and select Add Single Device
from the drop-down menu. The Add Multiple Devices dialog pops up.
3. In the Add Multiple Devices dialog, select Whether ZTP configuration is supported, con-
figure the following options in the dialog:
l Initial Version: Select the initial version of the device in the drop-down list.
l VPN Net: Select the VPN network of the device in the drop-down list. For more
information about configuring VPN Network, refer to VPN Network.
l Correlate Configuration Packge: Select the configuration bundle of the device in the
drop-down list. For more information about configuring bundle, refer to Con-
figuration Bundle.
l Relate Business: Select the business of the device in the drop-down list. For more
information about configuring relate business, refer to SD-WAN Business Deploy-
ment.
l Geographic Location: Specify the geographic location of the device, select the
province, city, district and county where the device is located in the drop-down list.
o WAN Interface Name: Select the name of the WAN interface in the drop-
down list.
o Port: Select the port of the WAN interface in the drop-down list.
o Operator: Select the operator to which the device belongs in the drop-down
list, including China Telecom, China Unicom, China Mobile and Other.
o Internet Access: Specify the internet access of the device, including Static IP,
PPPoE, 3G/4G and DHCP.
n When selecting the Static IP, you need to specify the IP address, net-
mask and default gateway.
n When selecting the PPPoE, you need to specify the user name, password
and confirm password.
n When selecting the 3G/4G, you need to specify the access point, user
name, password, confirm password and dialer number.
1. Select Device > Device Management, and enter the Device Management page.
2. Click the triangle icon ( ) next to the Add Device button and select Add Multiple
Devices from the drop-down menu. The Add Multiple Devices dialog pops up.
3. Click Download Device Info File Template. The Save As dialog appears.
l Device Version: Select the initial version of the device in the drop-down list.
l Province: Specify the province where the device is located in the drop-down list.
l City: Specify the city where the device is located in the drop-down list.
l Country: Specify the county where the device is located in the drop-down list.
l WAN: Select the name of the WAN interface in the drop-down list.
l Interface: Select the port of the WAN interface in the drop-down list.
l Service Provider: Select the operator to which the device belongs in the drop-down
list, including China Telecom, China Unicom, China Mobile and Other.
l When selecting the Static IP tab, you need to specify the IP address, netmask and
default gateway.
l When selecting the 4G tab, you need to specify the access point, user name, pass-
word, confirm password and dialer number.
7. In the Add Multiple Devices dialog, click Browse. The Open dialog appears.
8. Locate the modified template and click OK. HSM starts to load the template.
9. After loading the template, click Upload. HSM starts to read the template and add the
devices in it to HSM. If failed to register one device, all devices in the template will be
failed to be registered. To view the error information, hover over the exclamation mark ( )
1. Select Device > Device Management, and enter the Device Management page.
2. Select the device needed to be edit in the list, click Edit ZTP Configuration from the tool-
bar, select Correlate VPN or Correlate Configuration Package in the drop-down list.
3. In the Correlate VPN dialog or Correlate Configuration Package dialog, specify the VPN net-
work or configuration package.
4. Click OK.
1. Select Device > Device Management, and enter the Device Management page.
2. Click Preconfiguration from the toolbar, import the pre-configuration file in the Pre-
configuration dialog.
3. In the Network Configuration area, specify a mapped public network IP for HSM , and the
devices can register to the HSM through the public network. Specify the public network IP
or domain name, registration Port, FTP port and syslog port, click the Save.
4. In the Preconfiguration area, type the name and description for the platform, click Upload,
select the configuration file to upload.
5. In the Preconfiguration list, you can view, download and delete the pre-configuration file.
1. Move the cursor to the All Devices area of the device navigation pane, right-click and select
Create Device Group. The Device Group Configuration dialog pops up.
2. Type the device group name in the Name text box. If necessary, give a description to the
device group in the Description text box.
3. Select a device group for the newly created device group in the selecting box under the
Description text box. The created device group will belong to the selected device group.
The newly created device group will be displayed in the device navigation pane. You can adjust
the position of the device group by drag-and-dropping.
l Cut and paste: You can add multiple devices to a device group. The operating steps are listed
below.
To add devices to a device group by cutting and pasting, take the following step:
1. Select the devices to be added from the device table (check the corresponding check
boxes).
4. Move the mouse back to the device table area, right-click and select Paste Device.
Auto Group
System supports auto group by geographic location or VPN network. When adding or editing
devices, if no device group is specified, the devices will be grouped according to the configured
auto group type. When the device has no geographic location or VPN network, it will be placed in
the ungrouped group. By default, the auto group function is not enabled.
To auto group, take the following steps:
2. Select Group by Geographic Location or Group by VPN Net in the Group by drop-down
list.
3. Click Save.
Notes: When the device belongs to two different VPN networks at the same time,
only put the device into the star network.
System supports to back up the current device and device group views to restore the previous
device grouping as needed.
l Click Achive to save the current device group. The archive will overwrite the original backup.
Notes: If a device is added after the backup, the device will be placed in the
ungrouped device group after the backup is restored; if the device is deleted after
the backup, the device will be moved out of the device group after the backup is
restored.
l Drag and drop: In the device navigation pane, select the device to be deleted, and then drag it
out of the device group.
l Cut and paste: You can delete multiple devices from a device group. The operating steps are
listed below.
To delete devices from a device group by cutting and pasting, take the following steps:
1. Select the device group from the device navigation pane, and the device table shows all the
devices in the selected device group.
2. Select the devices to be deleted from the device table (check the corresponding check
boxes).
5. Move the mouse back to the device table area, right-click and select Paste Device.
1. Select the device group to be edited from the device navigation pane.
Favorite Device
You can mark your important devices as favorite to make them easy to be find and managed.
Click the button in the tool bar to add the specified device as the favourite device.
Click the Filters icon on the right of All Devices, select the Favourite Only check box to display
the favourite devices.
To remove from favorite, click Remove From Favorite.
Option Description
Session Query
You can search current sessions of managed device according to the specified criteria by session
query.
To query sessions, take the following steps:
1. Select the device which you want to query sessions from the device table, then click View
in Session column to enter session query page.
2. Enter value in one or more text fields in the pop-up dialog box, then click the Search but-
ton.
Source Addr: Specify the source IP address, you may enter IPv4 or IPv6 address.
Src Port: Specify the source port of service.
Destination Addr: Specify the destination IP address, you may enter IPv4 or IPv6 address.
Dst Port: Specify the destination port of service.
Protocol: Specify the transport layer protocol of service.
The search result will be displayed in the session list. If you don't enter any value and click
Search button directly, all current sessions will be displayed in the list.
1. Select the device to be deleted from the device table, and click the Delete Device button
above the device table; or select the device to be deleted from the device navigation pane,
right-click and then select Delete Device.
2. Click Yes on the Information dialog. The device is moved to the recycle bin.
3. Click the Recycle Bin label from the device navigation pane, and the device table shows all
the devices in the recycle bin. Select the device to be deleted, and click the Delete Device
button above the device table again.
4. Click Yes on the Warning dialog. Now the device is permanently deleted from HSM.
Online Reboot
The managed devices can be restarted immediately or restarted on schedule through HSM.
Immediate Reboot
2. Select the devices to be restarted from the device list, and then click the Reboot Imme-
diately button at the upper right corner of the toolbar, or click the small triangle to the right
of the button and select Reboot Immediately.
The devices will be restarted immediately, and the icon in the Status column will be changed from
to . If the reboot is successful, the icon will be changed from to .
You can configure a scheduled reboot task so that one or more managed devices can be restarted
according to the time set in the task.
To configure a scheduled reboot task, take the following steps:
2. Click the small triangle to the right of the Reboot Immediately button at the upper right
corner of the toolbar and select Reboot Schedule Configuration in the menu.
5. Click OK, the newly created task will be displayed in the task list.
The newly created task is enabled by default. Check the task, and then click Disable in the
toolbar to disable the task. Click Edit or Delete in the toolbar to edit or delete the task sep-
arately. Click the Log link of the corresponding task in the Log column to view the logs gen-
erated by the task. You can also view the device's reboot log by clicking the icon in the
Reboot Log column on the Device Management page.
When the reboot task which is absolute time type has been executed, its status will become
invalid. Invalid task also can be disabled. The invalid status can be changed to enabled by editing
the reboot time to an valid time.
You can set the restart parameters to determine whether the configuration of the managed device
can be saved or not before restart. This feature is only applicable for NGFW devices of 5.5R4P1
and higher version.
To set restart parameter, take the following steps:
2. Click the small triangle to the right of the Reboot Immediately button at the upper right
corner of the toolbar and select Restart Param in the menu.
3. Select Save configuration before restart or Do not save configuration before restart radio
button in the Restart Param dialog.
By default, Save configuration before restart is selected. If you select the Do not save con-
figuration before restart radio button, when you want to reboot device immediately, a
prompt box will pop up to prompt you that the configuration will be lost after reboot. You
can click the Modify Restart Parameter link to enter the Restart Param page to modify
restart parameters.
1. Select Device > SD-WAN Start, and enter the SD-WAN Start page.
2. Click Add Device, or click the triangle icon next to the Add Device button on the toolbar
and select Add Single Device from the drop-down list.
Initial Ver- Select the initial version of the device from the drop-
sion down list.
VPN Net Select the star network to which you want to add the
device from the drop-down list. To create a star Net-
work, see VPN Network.
Relate Busi- Select the business to be deployed to the device from the
ness drop-down list. To create a business, see SD-WAN Busi-
ness Deployment.
Interface Configuration
WAN Inter- Specify the WAN interface for the device. You can add
LAN Inter- Specify the LAN interface for the device. You can add up
Device Select a device group for the device, and then the device
Group will be added to the selected device group.
3. Click OK.
4. Select the device that has completed the SD-WAN start configuration, click Export ZTP
Configuration on the toolbar to save the configuration file "ZTP_Configs.zip" to the local,
and then copy the configuration file to a USB flash drive for the firewall device to load.
1. Select Device > SD-WAN Start, and enter the SD-WAN Start page.
2. Click the triangle icon next to the Add Device button on the toolbar, and select Add Mul-
tiple Device from the drop-down list. The Add Multiple Device dialog box will pop up.
3. Click Download Device Info File Template to download and save the template. The default
template name is "ztpdeviceinfo.xls".
4. Open the template, select ZTP Information, ZTP Information - static IP, ZTP Information
- DHCP, ZTP Information - PPPoE, ZTP Information - 4G or ZTP Information - LAN
tab, and configure the following options:
l Device Name: Specify the device name to be displayed in HSM. You can enter up to
32 characters.
l Device Platform: Select the platform of the device from the drop-down list.
l Device Version: Select the initial version of the device from the drop-down list.
l Device Group: Select a device group for the device, and then the device will be
added to the selected device group. You can enter up to 64 characters.
l Province: Specify the province where the device is located from the drop-down list.
l City: Specify the city where the device is located from the drop-down list.
l Country: Specify the county where the device is located from the drop-down list.
l Association Network Name: Specify the VPN network to which you want to add the
device.
l Association Business Name List: Specify the business to be deployed to the device.
l Association ZTP Global Config Template Name: Specify the ZTP configuration tem-
plate to be deployed to the device.
l When selecting the ZTP Information - Static IP tab, you need to specify the SN,
WAN, interface, service provider, preference, IP address, netmask and default gate-
way.
l When selecting the ZTP Information - DHCP tab, you need to specify the SN,
WAN, interface, service provider, and preference.
l When selecting the ZTP Information - PPPoE tab, you need to specify the SN,
WAN, interface, service provider, preference, username, and password.
l When selecting the ZTP Information – 4G tab, you need to specify the SN, WAN,
interface, service provider, preference, 4G access point, username, password, and 4G
dial string.
l When selecting the ZTP Information – LAN tab, you need to specify the SN, LAN,
interface, IP address, netmask, enable DHCP, address pool start IP, and address pool
termination IP.
6. In the Add Multiple Device dialog box, click Browse, and the Open dialog box will pop up.
7. Locate the modified template and click OK. HSM starts to load the template.
8. After loading is complete, click Upload. HSM starts to read the template and add the
devices in it to HSM. If failed to register one device, all devices in the template will be
1. Select Device > SD-WAN Start, and enter the SD-WAN Start page.
2. Select the device you want to edit from the device list, click Edit Device on the toolbar,
and edit the device configuration in the pop-up Edit Device dialog box.
l If the device has not been activated, you can edit the device's SN, VPN network, con-
figuration package, business, etc. Alternatively, you can edit the device by clicking
Relate VPN Net, Correlate Configuration Package, Relate Business and Relate ZTP
Template on the toolbar.
l If the device is activated, you can specify a VPN network, configuration package,
business, and ZTP configuration template for the device, but if one of them is already
configured for the device, you cannot edit it.
3. Click OK.
2. Click ZTP Configuration Template on the toolbar, and the ZTP Configuration Template
dialog box will pop up
Option Description
Description Specify the description for the template. The value range
is 0 to 255 characters.
DNS Config Select the check box, and then specify the DNS server
for the device. You can specify up to two DNS servers.
NTP Config Select the check box, and then specify the NTP server
that the device needs to synchronize with. You can spe-
WLAN Con- Select the check box, and then configure WLAN.
fig
l WLAN Name: Specify the name of the WLAN.
CLI Config Select the check box, and then type commands into the
textbox. The value range is 0 to 10240 characters. System
will not check the syntax correctness of the user-defined
commands.
4. Click OK.
1. Select Device > SD-WAN Start, and enter the SD-WAN Start page.
2. Click ZTP Configuration Template on the toolbar, and the ZTP Configuration Template
dialog box will pop up.
4. Type the name and description for the platform, click Select to select the configuration file
to be uploaded, and click Open.
5. In the Uploaded Files list, you can view, download and delete the imported pre-con-
figuration files.
You can perform the following operations on the templates in the configuration template list:
l Click to edit the selected template. The name of the template cannot be modified.
1. Import the StoneOS firmware to the HSM system first. HSM will match the proper firm-
ware to the managed devices automatically.
HSM also supports to upgrade signature database of the managed Hillstone Networks devices,
including two parts: one is that the managed device can obtain the signature database file from
HSM who is as a update server for online upgrade, and the other is to configure the signature data-
base upgrade template in HSM to be delivered to the managed device. IPS signature database,
application signature database, Anti-Virus signature database and URL database can be upgraded.
You can check the upgrading task status in the Status page, and also you can get the upgrading logs
in the Upgrade Log page or Task Log page.
After the task is successfully configured, you can check the upgrading status from the Current
Upgrade Task dialog, and also you can view the upgrading logs from the upgrading log page.
Importing/Deleting a Firmware
Three importing methods are supported by HSM: importing from the local PC, importing via
HTTP, and importing via FTP.
To import from the local PC, take the following steps:
3. On the Importing Firmware dialog, select Local, click the browse button and select
4. Click OK to upload.
3. On the Importing Firmware dialog, select HTTP, and configure the following options:
l Username: Specify the username which is used to log into the HTTP server.
4. Click OK to upload.
3. On the Importing Firmware dialog, select FTP, and configure the following options:
l Username: Specify the username which is used to log into the FTP server.
4. Click OK to upload.
To delete a firmware from HSM, select the firmware to be deleted from the firmware table, and
then click the Delete button from the toolbar.
When upgrading devices through HSM, in order to successfully push the firmware to the managed
devices, you must specify a upgrade management IP before executing the upgrading task. The
management IP must be a reachable IP for the managed devices (usually, it is the management IP
of the HSM device)
To specify the upgrade management IP, take the following steps:
3. On the Upgrade Management IP Configuration dialog, type the address into the IP text box.
When the firmware is uploaded into HSM, HSM will match the firmware with the managed
devices automatically. The upgrading task specifies the device to be upgraded, the upgrade time
and so on.
To configure the device upgrading task, take the following steps:
2. Select a firmware from the firmware table (check the corresponding check box), and then
click the Task button from the toolbar. The Device Upgrade dialog pops up. This dialog
shows all devices matching with the selected firmware.
l Backup Version: Select a version to be the backup firmware on the device (up to 2
versions can be saved on a device). You can choose the backup version by selecting
from the drop-down list. "Active" refers to the version currently running on the
device; "Backup" refers to the backup version on the device.
l Backup Configuration: It this check box is selected, HSM will back up the con-
figuration on the device when upgrading.
l Reboot: If this check box is selected, HSM will reboot the device after pushing the
firmware to the device successfully to make the new firmware take effect.
You can check the task status on the Current Upgrade Task (in the device upgrade page, click the
Status button) dialog. There are 7 task statuses:
l Waiting for upgrade: The device is waiting for loading the firmware from HSM.
l Waiting for reboot: When multiple devices are configured in the task, the devices which have
finished uploading the firmware will be marked as this status.
l Cancelling: The administrator cancelled the task and the device is cancelling the task.
l Upgrade succeeded: The device has rebooted with the newly upgraded firmware.
l Upgrade failed: You can get the failure reason from the upgrade logs.
2. On the upgrading page, click the Task button, and on the Current Upgrade Task dialog,
check the upgrading status for each device.
If you want to cancel the upgrading task, click the Cancel Upgrade button in the bottom-right
corner of the dialog. The executing task cannot be cancelled.
You can filter the log messages by selecting the conditions above the log message table.
The following illustration shows the layout of the device upgrade page.
Select different options from the upgrading navigation pane to go to the corresponding upgrading
pages. Functions of the upgrading navigation pane are described as below:
Option Description
Device Goes to the device upgrading page which includes the toolbar
Upgrade and the table of the StoneOS firmware. You can configure the
upgrading tasks and view the upgrading status on this page.
Upgrade Log Shows the upgrading logs. The search function is supported
for you to see required log messages.
Filter
You can filter the log messages by selecting the conditions provided here. The filter conditions
are described as below:
Option Description
Device Name Filter the log message with the device name.
2. Type the keyword in the text box and click the Enter
key. The messages in the specified scope include the
specified keyword will be displayed in the log message
table.
To cancel the keyword filter, you can take either of the fol-
lowing two methods:
l Delete the keyword from the text box and then click the
Enter key.
Main Window
The main window shows all the upgrading log messages. Columns of the log messages table are
described as below:
Option Description
As a Update server
After you have configured the signature database update server with IP address of HSM in the
managed device, the managed device can obtain the signature database file from HSM and upgrade
it online. Currently, HSM only supports one managed device to obtain a signature database file
from HSM simultaneously. If multiple managed devices obtain signature database files from HSM
at the same time, or a managed device simultaneously obtains multiple signature database files
from HSM, then only one of the devices can successfully obtain a signature database file.
In addition, you can also upgrade the managed device's signature database immediately via HSM:
2. Click the target signature upgrade tab, and then select signature version from the drop-down
menu in the upper-right corner of the toolbar.
4. According to the current version of signature database, select devices to be upgraded from
the device list.
If the configurations in an signature database upgrade template is delivered to managed device, the
signature database of the managed device will be upgraded according to the template. At most 100
signature database upgrade templates can be created respectively.
To create an signature database upgrade template, take the following steps:
2. Select the target signature upgrade tab, and then click the New button from the toolbar, the
corresponding Update Server Configuration dialog appears.
Option Description
Whether Select the check box and set the update time, the sig-
Automatic nature database of managed device will be automatically
updated according to the settings.
Stand-by When the primary proxy server can not access the Inter-
Proxy net, the backup proxy server will take effect. It is
optional.
4. Click OK, the upgrade template will appear in the template list.
In The Device To SendDown colunm, click the corresponding link to view all relevant
devices and their status.
2. Click the target signature upgrade tab, and then select the upgrade template which you want
to deliver, and then click the SendDown button from the toolbar.
l The device to SendDown refers to device whose update server settings are different
from the template.
l All devices, i.e. the relevant devices, include the device to senddown, the offline
device, and device whose update server settings are the same as the template.
4. Click OK, the configuration in upgrade template starts being delivered, and a task has been
generated.
Click View Task Log to view the deliver log for the signature upgrade template. You can
also go to the Task Management page to view information such as the status of the task.
Notes: HSM cannot deliver an upgrade template to the StoneOS 5.5R8F4 or above.
l Configuration File List tab: Displays configuration files of Hillstone Networks devices and the
corresponding information.
For detailed information about configuration file management, see the following topics:
After you perform the retrieval action, HSM retrieved the running configuration file from the
selected Hillstone Networks device. HSM supports the automatic retrieving of configuration
files, manual retrieving of configuration files and retrieving of configuration files on schedule. The
maximum number of configuration files can be stored by HSM is 10,000.
l Before performing the Deploy Configuration action in Configuration > Device Configuration
l After performing the Import Configuration action in Configuration > Device Configuration
1. With the Configuration File List tab active, select a device from the device navigation pane.
Click the icon in the top-right corner of the device list to filter device type, including
2. Click Retrieve Configurations in the toolbar. The Retrieve Configurations dialog pops up.
3. In the dialog, modify the file name and enter the description (optional).
After retrieving the configuration file successfully, you can view the retrieved file in the main win-
dow in the Configuration File List tab.
You can set a schedule to obtain configuration files for the specified device at a specified time. To
retrieve the configuration files on schedule, take the following steps:
2. Click Retrieve Configurations Schedule in the top-right corner, the Retrieve Configurations
Schedule dialog pops up.
3. Choose devices that will be retrieved configuration files in the left device list.
Click the icon in the top-right corner of the device list to filter device type, including
l Every Day: Select the radio button to specify the specific time each day to get the
configuration files.
l Every Week: Select the radio button to specify the specific time every week to get
the configuration files.
l Every Month: Select the radio button to specify the specific time every month to get
the configuration files.
l No plan: There is no retrieving schedule for configuration files. This option is selec-
ted by default.
5. Click OK , the system will retrieve configuration files at the specified time.
You can enter the HSM System Log page to know whether the configuration file is retrieved
successfully or not by viewing logs of the Get Configuration operation type.
To view the detailed configurations in a configuration file, take the following steps. The con-
figurations will display in CLI format.
3. Click View Configurations in the toolbar. The View Configurations dialog pops up and dis-
plays the detailed configurations.
The change history of a configuration file records the detailed information about each change
record.
To view the change history, take the following steps:
1. With the Configuration File List tab active, select a device from the device navigation pane.
The related configuration files are displayed in the main window.
3. Click the View link in the Change History column. The Configuration Change History dia-
log pops up and displays the change history of this selected configuration file.
In order to apply the backup configuration files to the device, you can restore the configuration
files.
To restore a configuration file, take the following steps:
1. With the Configuration File List tab active, select a device from the device navigation pane.
The related configuration files are displayed in the main window.
2. Select a configuration file. Only one configuration file can be restored to the corresponding
device.
l On Schedule: Selecting On Schedule radio button to specify a time to restore the con-
figuration file. The time point must be after the current time of HSM system, oth-
erwise, the configuration might not be restored.
4. Click OK to save your settings and close the dialog. A notice of the detailed task will pop
up from the below. Click the information to enter the task schedule page.
Notes: The device restoring the configuration file can not execute other tasks of
restoring configuration file, otherwise the task will fail.
In order to get the backup configuration files, you can export the configuration files from HSM to
your local PC.
To export a configuration file, take the following steps:
1. With the Configuration File List tab active, select a device from the device navigation pane.
The related configuration files are displayed in the main window.
4. Click OK, and then Save as page appears. You can select the save path and rename the con-
figuration file according to your need.
Notes: Format of the configuration file which be export from HSM is ZIP.
In order to backup the local configuration files, you can import the local configuration files to
HSM.
To import a configuration file, take the following steps:
1. With the Configuration File List tab active, select a device from the device navigation pane.
The related configuration files are displayed in the main window.
3. Click Import Configuration File from the toolbar. The Import Configuration File page and
Browse page appears. Select the local configuration file from the Browse dialog. Click OK,
and the open dialog closes. The name of configuration file to be imported and the loading
progress bar will be displayed in the Import Configuration File dialog.
4. Click Upload, and then the upload progress bar will be displayed. You can see the con-
figuration file which be imported successfully in the main window.
Use the Compare function to view the differences between two configuration files. The con-
figuration files for comparison can be from one device or from two different devices.
To compare configuration files, take the following steps:
3. Click Add to Compare. The File Comparison List dialog appears. The selected two files are
added to this list with the device name and the file name displayed. To change files, you can
delete them from the list by clicking Delete, and then select new configuration files.
4. In File Comparison List, click Compare. The Compare Configuration dialog pops up and dis-
plays the detailed configurations in each file. The differences are marked with red.
1. With the Configuration File List tab active, select a device from the device navigation pane.
The related configuration files are displayed in the main window.
l Status: Select status for this file: Deletable or Permanently Saved. Deletable is the
default status and represents that this file can be deleted. Permanently Saved rep-
resents that this file cannot be deleted. For each device, the maximum number of files
with the Permanently Saved status is 10.
1. With the Configuration File List tab active, select a device from the device navigation pane.
The related configuration files are displayed in the main window.
2. Select files to be deleted by selecting the checkboxes before the file name.
3. Click Delete in the toolbar to delete the selected files. If the selected files contain the Per-
manently Saved files, the Delete button becomes grey.
Use the Filter function to quickly locate the desired configuration files that meets the filter con-
ditions.
To use the Filter function, take the following steps:
1. With the Configuration File List tab active, select a device or a device group. The related
configuration files of this device or this device group are displayed in the main window.
3. Click Search. The configuration files that meet all filter conditions are displayed in the main
window.
1. With the Configuration Change History tab active, select a device from the device nav-
igation pane. The related change records of this device are displayed in the main window.
1. With the Configuration Change History tab active, select a device from the device nav-
igation pane. The related change records of this device are displayed in the main window.
Use the Filter function to quickly locate the desired configuration files that meets the filter con-
ditions.
To use the Filter function, take the following steps:
1. With the Configuration Change History tab active, select a device or a device group. The
related change records of this device or this device group are displayed in the main window.
Filter Condi-
Description
tion
3. Click Search. The change records that meet all filter conditions are displayed in the main
window.
User Management
HSM supports to manage the users of the devices that registered to HSM, as well as batch modify
the user information. At present, only the 5.5R1 and above NGFW devices are supported.
The operations about users include:
l After the user is delivered, if the user already exists on the specified devices, the password
will be changed to the delivered one;
l After the user is delivered, if the user doesn't exist on the specified devices, the delivered
user and password will be added on the devices automatically. The role of the added user is
2. Click New, and the User Configuration dialog will pop up.
4. Enter the password into the Password text box, and enter it again into the Confirm Pass-
word text box.
5. Input the description of the user into the Description text box.
6. Click OK.
8. Select the firewall devices that need to modify password. Only the 5.5R1 and above NGFW
online devices will be displayed in the list.
9. Click OK.
2. Select the user that needs to change the password, click Edit and the User Configuration dia-
log will pop up.
4. Click OK.
5. Refer to Step 7-9 in the above to deliver user password to the firewall devices.
2. Select the users to delete, click Delete, and the Confirm dialog box will pop up.
3. Click OK.
3. Hover the mouse over the icon and the User Verification dialog will pop up.
passed, click the icon again, you can view the user name and password of the firewall
1. Select the user, click the icon in the Operation Record list, and view the Operation
2. Click "detail" in the Modification column, and you can view the Username, Password,
Description, Delivered Device List and Delivered Device Status. If HSM fails to deliver
user information to the firewall devices, you can view the reason in the Delivered Device
Status row.
3. Select the "only difference" check box to view the differences between before modification
and after modification.
Device Inspection
HSM supports inspection function on NGFW device , NIPS/IDS device. You can check the
CPU usage, memory usage, resource usage, device operating environment, signature database, and
license status of the device by device inspection function and generate inspection reports. HSM
supports manual inspection, auto inspection, and smart inspection for a single device. It also sup-
ports batch auto inspection of multiple devices. Smart inspection refers to the auto inspection of
devices whose average utilization exceeds the specified threshold.
Manual Inspection
To check the status of the specified online device by manual inspection, take the following steps:
2. Click the Start button, check the specified device. Select multiple devices, click Batch Start
to check the status of devices at the same time.
3. Click Cancel, and click OK to cancel the inspection task in the prompt dialog.
Auto Inspection
You can configure a inspection task to check the device automatically at a specified time and send
the report to the specified mailbox. At the same time, you can also configure the smart inspection
task to check the device whose average utilization exceeds the specified threshold. After the
smart inspection is enabled, system will check the status of the device every hour. Both online
and offline devices can be configured with auto inspection task. Select the Hide Offline Devices
check box to display the online devices.
To check the status of the specified online device by auto inspection, take the following steps:
2. Click Config.
In the Regular Config tab, configure the options for regular inspection.
Option Description
Enable reg- Select the check box to enable the regular inspection
ular inspec- function.
tion
Enable Email Select the check box to send the inspection report to spe-
cified Email address. To add a recipient, type an Email
address to Receiver box, separate multiple recipients by
";".
In the Advanced Config tab, configure the options for smart inspection.
Option Description
Enable smart inspec- Select the check box to enable smart inspection
tion function.
3. Click Apply.
4. Click OK.
Batch Inspection
HSM supports the configuration of batch inspection to perform scheduled inspection or intel-
ligent inspection tasks on multiple devices. Only one inspection task can be configured for one
device. The last one takes effect on the configuration specified by the device. System supports 10
scheduled tasks.
To configure the batch inspection task, take the following steps:
In the Add Regular Task dialog, configure the options for batch regular inspection
Option Description
Name Specified the name of the inspection task. This name can-
not be repeated.
Enable reg- Select the check box to enable the regular inspection
ular inspec- function.
tion
Enable Email Select the check box to send the inspection report to spe-
cified Email address. To add a recipient, type an Email
address to Receiver box, separate multiple recipients by
";".
4. Click Apply.
5. Click OK.
l Edit Regular Task: Click Edit Regular Task to enable or disable the regular inspection task,
modify the user-defined inspection threshold and device list.
To configure the batch smart inspection task, take the following steps:
In the Add Config dialog, configure the options for batch smart inspection.
Option Description
Enable smart inspec- Select the check box to enable smart inspection
tion function.
4. Click Apply.
5. Click OK.
l Click button to view and download the detail of the report in the new window.
l Click button to download the report to local PC. The reports type can be ZIP.
License Management
HSM provides license management on managed devices, including:
l License Overview: displays the details about all licenses installed on the managed devices.
l License Distribution: You can install multiple licenses onto a managed device at a time.
License Overview
You can view information, such as status, type, effective time, and customer name, about all
licenses installed on managed devices on HSM.
Select Device > License Overview > License Overview.
When the device is registered with HSM for the first time or you install a license onto a managed
device on HSM, the system automatically obtain the information about all licenses installed on the
managed device. In addition, the system automatically obtains and updates the information about
licenses installed on online managed devices at a fixed point in time every day.
You can also manually synchronize the license information of an online managed device to HSM.
To do this, take the following steps:
1. Select Device > License Overview > License Overview. Then, click the name of the
required device in the device list.
2. Click next to the device list to synchronize the license information of the
device to HSM.
Tips: When you log in to HSM or the system completes license information syn-
chronization, if a license expires, the system sends the corresponding notification to
you. You can click this notification to view the details in the License Overview tab.
Importing Licenses
2. Click Import. In the Import License dialog box, click Browser and select the license files.
HSM supports the following file types: zip, tar, and gz.
2. Select all the devices or the devices needed to install incenses in the device list.
3. In the Not Installed tab, select the licenses needed to be installed and click Install.
4. In the prompt dialog, click Restart Immediately to restart device. You can also click Restart
Later and then restart the device through the system management page of the device to
make the license effect.
5. After installed, you can view the detail of the licenses in the Installed tab, such as file name,
device name, license type, license status, expired time, and install time.
6. The licenses that failed to be install will be displayed in the Failed Installation tab. Click
"+" to view the failed reason. Select the licenses needed to be re-installed, click Install to
re-install the license.
Notes: Click Install All in the upper-left corner to install all the uninstalled licenses
or all the licenses that are failed to be installed. This way, you can install these
licenses onto all managed devices.
2. Select all the devices or the devices needed to delete incenses in the device list.
3. Select the licenses needed to be deleted in the Installed, Not Installed, or Failed Install-
ation tab, click Delete.
The system allows you to delete all licenses that are installed on managed devices on HSM and
whose status is expired. To do this, take the following steps:
2. Click Clean All in the upper-left corner to delete all the expired licenses in the Installed tab.
Deployment Scenario
A company is headquartered in Beijing and has branches in Shanghai and Guangzhou. Each office
is deployed with a Hillstone Networks security appliance to control Internet access. The require-
ment is to deploy an HSM in Beijing to manage the three devices, as shown below:
Requirement
Requirement 1: Add three security appliances
Requirement 2: Retrieve configuration files
Configuration Steps
Preparation
Configure a management IP address and the system time on HSM as described in Deploying HSM
Management Environment.
1. Click Device > Management from the level-1 navigation pane to enter the Device Man-
agement page.
2. Click the triangle icon ( ) next to the Add Device button and select Add Multiple
Devices from the drop-down menu. The Add Multiple Devices dialog pops up.
3. Click Download Device Info File Template. The Save As dialog appears.
7. In the Add Multiple Devices dialog, click Browse. The Open dialog appears.
8. Locate the modified template and click OK. HSM starts to load the template.
9. After loading the template, click Upload. HSM starts to read the template and add the
devices in it to HSM. If failed to register one device, all devices in the template will be
failed to be registered.
When there is a green up arrow ( ) next to the device name, it indicates that the configurations
in the device have changed.
1. Select Device > Management and then click the Device Management tab.
2. In the device navigation pane, select the device from which you want to retrieve the con-
figuration file.
3. With the Configuration File Management tab active, click Retrieve Configuration in the tool-
bar. The Retrieve Configurations dialog appears.
4. Change the file name to test by myself_201311191354 and add the description: this is a
test.
l Policy: HSM supports to configure policy rules for device. One policy can be deployed to mul-
tiple devices, but one device can only have one policy. HSM supports private policy and
shared policy.
l Private Policy: The policy that only belongs to one certain device, and cannot be used
by other devices. A private policy can be converted to a shared policy.
l Shared Policy: One shared policy can be used by any device. A shared policy can be
l NAT: HSM supports to configure SNAT and DNAT rules, and supports private NAT rule
and shared NAT rule.
l Private NAT : The NAT that only belongs to one certain device, and cannot be used by
other devices. A private NAT cannot be converted to a shared NAT.
l Shared NAT : One shared NAT can be used by any device. A shared NAT cannot be
copied as a private NAT . There is a in front of the shared NAT rule name.
l Route: HSM supports to configure destination route rules, and supports private destination
route rule and shared destination route rule.
l Shared Route: One shared route can be used by any device. A route NAT cannot be
copied as a private route . There is a in front of the shared route rule name.
l Private Object: The object that only belongs to one certain device. When a private
policy is converted to a shared policy, the private objects of the private policy are con-
verted to shared objects as well.
l Shared Object: A shared object can be referenced by all rules, including the private
rules. A shared object cannot be converted to a private object.
l Device Configuration Sync: HSM checks the configuration of a device on both the local
device and HSM, and list the configuration differences. Administrators can choose to upload
the configuration from the local device to HSM or deploy configuration from HSM to local
device according to the differences.
l Rule Redundance check: In order to make the rules in the policy are effective, HSM provides
a method to check the conflicts among rules in a policy. With this method, administrators can
get the rule shadow information.
l Rule hit statistics: For the rules running on the devices, HSM gathers the hitting statistics and
shows the result with a pie chart, helping administrators learn the traffic matching status in
their networks.
l Redundant object check: Redundant objects refers to the objects those unreferenced by any
policy or the objects having different names but with same contents.
HSM supports single device policy management (device configuration) and global policy man-
agement (shared configuration). HSM provides the task management method to track the policy
l When a group of HA devices are registered to the HSM system, the configuration of master
device is basic configuration. When the master and backup status of the HA group is
switched, basic configuration remains unchanged.
l After managed devices are registered to HSM , the configuration of master device when the
HA group is first established is basic configuration.
l If the managed device unbinds HA group and re-establishes another HA group, the con-
figuration of master device in the new HA group is basic configuration.
For the detailed information about policy management, see the following sections:
l Device Configuration
l Global Configuration
l Device Configuration
l Device Object
Device Configuration
Click Configuration > Device Configuration to enter the device configuration page. The related
configurations are:
l Policy
l Policy Assistant
l Policy Analysis
l iQoS
l NAT
l Route
l LLB
l Configuration Management
The rules created on the device configuration page are all private rules, and belong to a certain
device. On HSM, you can create, edit, and delete the private rules. After configuring the private
rules, you need to deploy the private rules to the managed device if you want to take effect on the
device. For more detailed information about deploying configuration, see Synchronizing Con-
figuration.
1. Click Configuration > Device Configuration to enter the device configuration page.
Option Description
Src Zone Specifies a source zone of the policy rule. There are 8 pre-
defined security zones in system, which are trust, untrust,
dmz, L2-trust, L2-untrust, L2-dmz, vpnhub (VPN func-
tional zone) and ha (HA functional zone). You can also
use the customized zones of StoneOS.
Dst Zone Specifies a destination zone of the policy rule. There are
8 predefined security zones in system, which are trust,
untrust, dmz, L2-trust, L2-untrust, L2-dmz, vpnhub
(VPN functional zone) and ha (HA functional zone). You
User Specifies a user or user group for the security policy rule.
l Secured connection:
Record Log You can log policy rule matching in system logs according
to your needs.
Data Security You can view the state of data security on HSM.
l Content Filter:
SSL Proxy Displays the SSL Proxy rule in the HSM device. The
device can be decrypted and HTTPS traffic can be con-
trolled by the combination of policies and the SSL Proxy
rule.
QoS Tag Add QoS tag to the matched traffic by typing the value
into the box. The smaller the value of the QoS tag is, the
higher the priority of the device allowing the traffic to
pass will be.
Hits Displays the number of user traffic which hits the secur-
ity policy.
Shadow Select the Rule Conflict Check box. You can view the
number of rules and ID which are covered, and delete the
rules as needed.
Last Hit Date The last date when user traffic hits the security policy.
4. In Security Policy page, three ways can be used to insert a new rule:
l Click the New IPv4 Rule or New IPv6 Rule arrow after, select the position ( Bottom,
Top, Bottom in group, Top in group, After, Before) from the menu where the inser-
ted rule locates;
l Right-click on a rule in the entry list and select New Rule, then choose Bot-
tom/Top/After/Before from the pop-up menu;
l Right-click on a rule group in the entry list and select New Rule, then choose Bot-
tom/Top/Bottom in group/Top in group/After/Before from the pop-up menu.
An all-deny rule will be created at the specified position. Click the New Rule button dir-
ectly without specifying the position, the system will create an all-deny rule at the bottom of
the rule list.
5. Edit the rule according to your own requirements. For more information, please refer to
"Editing Rules" on Page 235.
l Select one rule first and hold the Ctrl key to choose discontinuous rules;
l Select one rule first and hold the Shift key to choose continuous rules.
l Right-click on the blank cell and select Paste, then choose Bottom/Top from the
pop-up menu;
l Right-click on a rule in the entry list and select Paste, then choose Bot-
tom/Top/After/Before from the pop-up menu;
l Right-click on a rule group in the entry list and select Paste, then choose Bot-
tom/Top/Bottom in group/Top in group/After/Before from the pop-up menu.
The copied rules will be pasted at the specified position.
3. Edit the rule according to your own requirements. For more information, please refer to
"Editing Rules" on Page 235.
The security policy rules will be displayed in the following order: head policy rules, policy
rules of the device, and tail policy rules.
Notes: HSM does not support to copy private policy rules to another private policy.
Editing Rules
l To enter into Advanced Edit mode, in the policy rule list page, hold the Ctrl key, click a cell
with the left mouse button, and then the cell content will be copied to clipboard. Click the
policy rule option which you want to modify with the left mouse button, select Cover Paste
to cover the clipboard contents to the policy option, or select Add Paste to add the clipboard
contents to the policy option.
Security policy rule group is the management unit of rules . HSM will not deploy rule group to the
managed devices. You can organize the rule which has already existed to the rule group, and create
new rules in the rule group also. Rule groups can be folded and expanded. Two ways can be used
to create a new rule group as below.
To create a rule group by inserting, take the following steps:
l Click the New Rule Group arrow after, select the position ( With selected rules, Bot-
tom, Top, After, Before) from the menu where the inserted rule locates;
l Select one rule, right-click and select New Rule Group, then choose With selected
rules/Bottom/Top/After/Before from the pop-up menu; or hold the Shift key to
choose continuous ungrouped rules in the entry list, right-click and select New Rule
Group, then choose With selected rules/Bottom/Top from the pop-up menu;
If With selected rules was selected, the specified rules would be added to the new
group.
l Right-click on a rule group in the entry list and select New Rule Group, then choose
Bottom/Top/After/Before from the pop-up menu.
2. In the New Rule Group dialog box, enter group name and click OK.
A rule group will be created at the specified position. Click the New Rule Group button dir-
ectly without specifying the position, the system will create a rule group with selected rules.
You can click the group name to modify the name.
To create a rule group by the copy/paste way, take the following steps:
1. In Security Policy page, select a rule group from the rule list, right-click on the rule group
and choose Copy from the pop-up menu.
You can copy one or more security policy rule groups:
l Select one rule group first and hold the Ctrl key to choose discontinuous rule groups;
l Select one rule group first and hold the Shift key to choose continuous rule groups.
l Right-click on the blank cell and select Paste, then choose Bottom/Top from the
pop-up menu;
l Right-click on a rule in the entry list and select Paste, then choose Bot-
tom/Top/After/Before from the pop-up menu;
l Right-click on a rule group in the entry list and select Paste, then choose Bot-
tom/Top/After/Before from the pop-up menu.
The copied rule groups will be pasted at the specified position, in which all oringinal rules
are included. Meanwhile, group name remains unchanged.
Notes: HSM does not support to copy private rule groups to another private policy.
To move a rule or group, select the rule or group to be moved, press and hold the left mouse but-
ton and move to the target position, then release the left button. If a rule group is moved, the rel-
ative position of the rules in the rule group will remain unchanged. Rules can be arbitrarily moved
in or out of rule group, but the rule group can not be moved into another rule group.
1. In Security Policy page, select a rule group from the rule list and click Delete from the tool-
bar.
In the pop-up dialog box, if the Delete rules check box is checked, the system will delete
the rule group and all the rules belonging to the group; if not, the system will only delete the
rule group.
Partition group is the management unit of devices. You can add correlated devices into one par-
tition group.
To create a partition group, take the following steps:
1. Click Configuration > Tools> Deploy a batch of rules , and the Deploy a batch of rules
guide dialog will pop up.
3. Type the partition group name into the Name text box.
4. Select the devices to be added from the Relevant Device drop-down list.
1. Click Configuration > Tools> Deploy a batch of rules , and the Deploy a batch of rules
guide dialog will pop up.
The following are three steps in the guide. Click Next once one step is completed.
You can select the position for the incoming security policy rules: top or bottom.
You can configure policy rules for the partition groups. Policy configuration includes cre-
ating/editing/deleting/moving rules. For more detailed information about deploying con-
figuration, see Policy Configuration.
After the above configurations, click Deliver to add the policy rules to the devices in the partition
group.
1. Click Configuration > Tools > Batch Deliver CLI, and the Batch Deliver CLI dialog will
pop up.
4. Click Deliver.
You can view the specified security policy rules by setting up filters.
To view the security policy rules, take the following steps:
2. Select filter conditions from the Filter drop-down list, and then select filter conditions as
needed.
Option Description
All Displays the policy rules of all filters. You can enter any
character and system will filter out the policy rules that
contain the character under all the filters.
Sre Zone Displays the policy rules of the specified source zone.
Sre Address Displays the policy rules of the specified source address.
Server Name Displays the policy rules of the specified service name.
Server port Displays the policy rules of the specified server source or
destination port.
3. Click Enter to search the policy rules that matches the filter conditions.
4. To delete a filter condition, hover your mouse on that condition and then click the icon.
To delete all filter conditions, click the icon on the right side of the row.
You can export and save the filtered policy rules in the local.
To export the specified security policy rules, take the following steps:
1. In the Security Policy page, click Policy Export from the toolbar.
3. In the Save as dialog box, select the path to save the policy rules.
4. Click OK.
This feature is used to display the security policy section in the local snapshot file, in order to
facilitate users to copy the local modification to a shared or private policy. To copy rules or
groups in snapshot, take the following steps:
4. Click the minimize or close button to locate the target security policy page, right-click and
choose Paste to select the position from the menu where the copied rule locates.
Rule match analysis can search security policy rules that meet your requirements. For example, if
the source IP address you specified is included in the source address entries of a certain rule, then
this rule will be displayed in result list. You can view the result in the Match Details column. You
can view the specified match in the Match Details column.
Please take the following steps:
1. In Security Policy page, click Rule Match Analysis from the toolbar.
2. Enter value in one or more text fields in the pop-up dialog box.
Source Addr: Specify the source IP address.
Src Port: Specify the source port of service.
Destination Addr: Specify the destination IP address.
Dst Port: Specify the destination port of service.
Protocol: Specify the transport layer protocol of service.
4. Click the button in the Match Details column to view the matched polities.
l Rule Conflict Check: Check whether the rules overshadow each other. The effectiveness of
the rules will be improved by using this function.
l Rule Hit Statistics: Gather the rule hit statistics and show the statistics by pie chart.
Enable/Disable Rules
In Security Policy page, select a rule to be operated from the rule list, then double click the icon
in Status column to change the status.
Two ways are supported to perform the rule conflict check function:
l Way 1: Select the Tools > Rule Conflict Check , system begins to check the conflicts among
rules in the policy. When the checking process is finished, the useless rules will become
hatched, and all the rule IDs that overshadow the rule will be listed in the last column
(shadow) of the rule list. You can select all of the redundant rules by clicking on the number
in brackets after the check box, so that you can delete them in batches.
When there are more than 2000 policy rules, you need to use way 2 for detection.
l Way 2: From the device navigation pane, right-click on the device you want to check the rule
conflict, and then select Rule Conflict Check from the pop-up menu. The system generates
the task and begins to check. When the checking process is finished, click the View Report
l View Task: Open Task Management page to view the progress of the rule conflict in
the task list.
Notes:
l When system checks rule conflict, if there are more than 1500 policy rules,
only when one rule completely overshadows another one, system judges
there is rule conflict.
l System can only perform one task of check rule conflict at the same time.
2. Select the device you want to know the rule hit statistics, click Next.
3. In the Rule Hit Statistics dialog, specify a time period of statistics (the default time period is
the latest month), and click View Report. The report appears. Click Save to save the PDF
format report locally.
The private policy only belongs to one device, and you can convert a private policy to a shared
one for other devices.
Notes: Private policies can not be converted to shared ones when security policies
are configured with Data Security , SSL Proxy , Botnet Defense and IPS rules or
linked with From Tunnel(VPN) or Tunnel(VPN).
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. From the device navigation pane, select the device whose policy will be converted. From
the object navigation pane, right-click on the policy and click Convert to Shared from the
pop-up menu.
3. Specify the name for the converted policy in the Policy Name text box.
The HSM system currently supports policy-based anti-Virus, IPS, URL filtering, or sandbox pro-
tection check.
To realize the policy-based protection function,
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. From the device navigation pane, select the device whose policy will be edited. From the
object navigation pane, and select Policies. The main window shows the policy rule list.
Option Description
Anti Virus Select the On check box to enable Anti Virus function.
Select the Anti Virus rule from the drop-down list. Two
ways can be used to configure an Anti Virus rule:
Intrusion Pro- Select the On check box to enable IPS function. Select
tection Sys- the IPS rule from the drop-down list. You can select
predefined IPS rules or user-defined IPS rules in the
tem
managed device. System provides different predefined
IPS rules for firewalls in different versions. For more
information, see "Intrusion Protection System".
: In the drop-down list, you
URL Filter Select the On check box to enable URL Filter function.
Select the URL Filter rule from the drop-down list.
According to the actual needs of users, select an URL Fil-
ter rule from the drop-down list. Or you can click New
from the drop-down list to create an URL Filter rule. For
more information, see URL Filter.
4. After configuring settings, displays the Anti Virus function status which is enabled,
displays the IPS function status which is enabled, displays the URL Filter function status
Policy Assistant
The function of policy assistant can help users to optimize security policy of the managed
devices, improve operation and maintenance efficiency of system and improve security of net-
work.
For a managed device, policy assistant can analyze the traffic that hits the specified security policy
in the device to generate a refined policy, and deliver it to the managed device.
Before the system administrator enables policy assistant of the managed device, the device needs
to ensure session log enabled and be sent to system; when specifying the security policy rules of
the managed device for policy assistant, ensure that all the policies of the device have been syn-
chronized to system.
Configure the parameters of policy assistant. For specific information, refer to "Configuration >
Default Parameters".
System allows to enable four rules of managed device's security policy to open policy assistant at
most. To open policy assistant, take the following steps:
2. Select the managed device that needs to open policy assistant function in the left navigation
bar.
3. Select "Policies" from the drop down list in the navigation bar. Click Security Policy, the
security policy rule list will display in the main window.
4. Click Policy Assistant to enter the Policy Assistant page, you can also perform other oper-
ations:
l Click Object Naming Rule button to jump to the Object Naming Configuration page.
You can customize naming rule of service book in the generated policy rule and con-
figure how to handle name conflict, for more information, refer to Ticket > Object
Naming Configuration.
Analyzing Traffic
After the policy assistant of the policy rule is opened, system automatically starts to analyze the
traffic that hits the specified rule, and you can view the analysis progress in the "Traffic Analysis"
column. Click in the "Operation" column to enter the View Analysis Result page. The View
Analysis Result page displays the "Source IP", "Destination IP", "Protocol/Destination Port" and
"Hits" of traffic that hits the specified rule.
On the View Analysis Result page, you can also perform other operations:
l Screening Condition: Configure the screening conditions for traffic data, system will filter out
the traffic that meet the conditions based on the source IP or destination IP.
l Aggregation Condition: Configure the aggregation conditions for traffic data. System will
merge traffic that meet the aggregation conditions and displays the aggregated traffic in the
list. System supports to specify the following four aggregation conditions: Source IP + Destin-
ation IP 、Source IP + Protocol/Port 、Destination IP + Protocol/Port 、Don't aggregate.
l Generate Policy: Enter the Generate And Deploy Policy page. System will generate cor-
responding policy rules based on the Src Zone of the source IP, the Dst Zone of the
After the traffic is screened and aggregated, refined policy rules are generated and displayed in the
list on the Generate and Deploy Policy page. Before deploying policy, you can perform other oper-
ations on the policy rule:
l Select the policy rules in the list, click Batch Enable or Batch Disable button to enable or dis-
able selected policy rules.
l Select the policy rules in the list, click Batch Delete button to delete selected policy rules;
Click button in the "Operation" column to delete the corresponding policy rule.
l Click in the "Src Zone"、"Dst Zone"、"Status" or "Action" column to modify the Src
Zone、Dst Zone、Status or Action of a policy rule.
l Select the policy rules with the same Src Zone、Dst Zone、Status and Action in the list,
click Combine Rule button to combine the selected policy rules.
In order to ensure the validity of the policy rules depolyed by system in firewalls, system needs to
perform redundant checks on the policy rules before deploying them, that is, check whether the
rules are shadowed by other policy rules in firewall according to their Src Zone、Dst Zone and
Status, the specific steps are as follows:
1. Select the policy rules in the list, click Redundancy D button to detect.
2. On the Redundancy Detection page, you can view the result of redundancy detection. In
the "Is Redundant" column, you can view whether the corresponding policy rules are shad-
owed. If the detected policy rule is shadowed with the existing policy rule in firewall, you
3. Select the policy rules in the list, click Deploy button to deploy them to managed device.
Notes: In the device's policy list, the rules deployed to the device will be before the
rule be analyzed.
Policy Analysis
HSM supports for policy hit analysis for StoneOS of 5.5 R7 or above. System checks the policy
rule hit counts, that is, when traffic matches a certain policy rule, the hit count will increase by 1
automatically. With the statistics of the first hit time, the last hit time, and the days since last hit,
you can identify the policy rule that need to be cleared. You can view the specified policy rules by
setting up filters.
To check the hit counts, take the following steps:
2. Select the managed device that needs to open policy analysis function in the left navigation
bar.
3. Select "Policies" from the drop down list in the navigation bar. Click Security Policy >
Policy Analysis.
4. Select filter conditions from the Filter drop-down list, and configure filter conditions as
needed.
Option Description
Days Since First Specify the day after the first hit. Then the policy rules which were hit
Hit> before the specified day will be displayed.
Days Since Last Specify the day after the last hit. Then the policies rules before the spe-
Hit> cified day will be displayed.
Days Since Specify the day after the policy is created. Then the policy rules before
Create Time> the specified day will be displayed.
6. To delete a filter condition hover your mouse on that condition and then click icon.
To clear the hit counts of policy rules, take the following steps:
3. Select "Policies" from the drop down list in the navigation bar. Then , click Security Policy
> Policy Analysis.
Option Description
5. Click OK.
You can also click Refresh button to update the statistics of the hit counts of policy rules.
Notes: After system executes the "Clear" function , the hit counts of corresponding
policy rules will become 0 on Policy Analysis page in HSM system, Policy Hit Ana-
lysis page and Security Policy page in the managed device system.
iQoS
HSM can manage iQoS (intelligent quality of service) intensively which guarantees the customer's
network performance, manages and optimizes the key bandwidth for critical business traffic, and
helps the customer greatly in fully utilizing their bandwidth resources.
iQoS is used to provide different priorities to different traffic, in order to control the delay and
flapping, and decrease the packet loss rate. iQoS can assure the normal transmission of critical
business traffic when the network is overloaded or congested. iQoS is controlled by license. To
configure iQoS for managed device, please apply and install the iQoS license on managed device.
Notes: HSM only supports the centralized management of iQoS function whose
NGFW version is 5.5R1 or above.
Implement Mechanism
The packets are classified and marked after entering the system from the ingress interface. For the
classified and marked traffic, the system will smoothly forward the traffic through shaping mech-
anism, or drop the traffic through policing mechanism. If selecting shaping mechanism to forward
the traffic, the congestion management and congestion avoidance mechanisms give different pri-
l Classification and marking mechanism: Classification and marking is the process of identifying
the priority of each packet. This is the first step of iQoS.
l Policing and shaping mechanisms: Policing and shaping mechanisms are used to identify traffic
violation and make responses. The policing mechanism checks traffic in real time, and takes
immediate actions according to the settings when it discovers violation. The shaping mech-
anism works together with queuing mechanism. It makes sure that the traffic will never
exceed the defined flow rate so that the traffic can go through that interface smoothly.
The system supports two-level traffic control: level-1 control and level-2 control. In each level,
the traffic control is implemented by pipes.
Pipes
By configuring pipes, the devices implement iQoS. Pipe, which is a virtual concept, represents
the bandwidth of transmission path. The system classifies the traffic by using the pipe as the unit,
and control the traffic crossing the pipes according to the actions defined for the pipes. For all
traffic crossing the device, they will flow into virtual pipes according to the traffic matching con-
l Traffic matching conditions: Defines the traffic matching conditions to classify the traffic
crossing the device into matched pipes. The system will limit the bandwidth to the traffic that
matches the traffic matching conditions. You can define multiple traffic matching conditions
to a pipe. The logical relation between each condition is OR. When the traffic matches a
traffic matching condition of a pipe, it will enter this pipe. If the same conditions are con-
figured in different root pipes, the traffic will first match the root pipe listed at the top of the
Level-1 Control list in the Policy > iQoS page.
l Traffic management actions: Defines the actions adopted to the traffic that has been classified
to a pipe. The data stream control includes the forward control and the backward control. For-
ward control controls the traffic that flows from the source to the destination; backward con-
trol controls the traffic flows from the destination to the source.
To provide flexible configurations, the system supports the multiple-level pipes. Configuring mul-
tiple-level pipes can limit the bandwidth of different applications of different users. This can
ensure the bandwidth for the key services and users. Pipes can be nested to at most four levels.
Sub pipes cannot be nested to the default pipe. The logical relation between pipes is shown as
below:
l For the sub pipes at the same level, the total of their minimum bandwidth cannot exceed the
minimum bandwidth of their upper-level parent pipe, and the total of their maximum band-
width cannot exceed the maximum bandwidth of their upper-level parent pipe.
l If you have configured the forward or backward traffic management actions for the root pipe,
all sub pipes that belongs to this root pipe will inherit the configurations of the traffic dir-
ection set on the root pipe.
l The root pipe that is only configured the backward traffic management actions cannot work.
The following chart illustrates the application of multiple-level pipes in a company. The admin-
istrator can create the following pipes to limit the traffic:
1. Create a root pipe to limit the traffic of the office located in Beijing.
3. Create a sub pipe to limit the traffic of the specified applications so that each application has
its own bandwidth.
The system supports two-level traffic control: level-1 control and level-2 control. In each level,
the traffic control is implemented by pipes. Traffic that is dealt with by level-1 control flows into
the level-2 control, and then the system performs the further management and control according
to the pipe configurations of level-2 control. After the traffic flows into the device, the process of
iQoS is shown as below:
According to the chart above, the process of traffic control is described below:
2. According to the traffic management actions configured for the pipes, the system manages
and controls the traffic that matches the traffic matching conditions.
3. The traffic dealt with by level-1 control flows into the level-2 control. The system manages
and controls the traffic in level-2 control. The principle of traffic matching, management and
control are the same as the one of the level-1 control.
The first level traffic control is enabled by default. To disable it, take the following steps:
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
4. In the Level-1 Control tab, click Disable First Level Control from the toolbar.
First level traffic control will be disabled. If you need to enable it, please click Enable First
Level Control from the toolbar.
The second level traffic control is disabled by default. To enable it, take the following steps:
4. In the Level-2 Control tab, click Enable Second Level Control from the toolbar.
Second level traffic control will be enabled. If you need to disable it, please click Disable
Second Level Control from the toolbar.
Pipe Configuration
By using pipes, devices implement iQoS. Pipes in different traffic control levels will take effect in
different stages.
Configuring pipes includes the following sections:
1. Create the traffic matching conditions, which are used to capture the traffic that matches
these conditions. If configuring multiple traffic matching conditions for a pipe, the logical
relation between each condition is OR.
2. Create a white list according to your requirements. The system will not control the traffic in
the white list. Only root pipe and the default pipe support the white list.
3. Specify the traffic management actions, which are used to deal with the traffic that is clas-
sified into a pipe.
4. Specify the schedule. The pipe will take effect during the specified time period.
Basic Operations
l Click the icon to expand the root pipe and display its sub pipes.
l Click the icon of the root pipe in Whitelist column to view the white list settings.
l If there is a red exclamation mark before pipe name, it means the pipe is not used. To
view the unusable reason, please hover over the exclamation mark.
l Create a root pipe: Select the Level-1 Control or Level-2 Control tab, then click New in the
menu bar to create a new root pipe.
l Create a sub pipe: Click the icon of the root pipe or the sub pipe to create the cor-
l Click Enable in the menu bar to enable the selected pipe. By default, the newly-created pipe
will be enabled.
l Click Disable in the menu bar to disable the selected pipe. The disabled pipe will not take
effect.
l Click Delete to delete the selected pipe. The default pipe cannot be deleted.
Creating a Pipe
To create a pipe:
1. According to the methods above, create a root pipe or sub pipe. The Pipe Configuration
page appears.
l Parent Pipe/Control Level: Displays the control level or the parent pipe of the newly
created pipe.
l The Shape mode can limit the data transmission rate and smoothly forward the
traffic. This mode supports the bandwidth borrowing and priority adjusting for
the traffic within the root pipe.
l The Policy mode will drop the traffic that exceeds the bandwidth limit. This
mode does not support the bandwidth borrowing and priority adjusting, and
cannot guarantee the minimum bandwidth.
Source Information
Zone Specify the source zone of the traffic. Select the zone
name from the drop-down menu.
Interface Specify the source interface of the traffic. Select the inter-
face name from the drop-down menu.
Destination Information
Zone Specify the destination zone of the traffic. Select the zone
name from the drop-down menu.
User Inform- Specify a user or user group that the traffic belongs to.
ation
1. From the User drop-down menu, select the AAA
URL Cat- Specifies the URL category that the traffic belongs to.
egory After the user specifies the URL category, the system
matches the traffic according to the specified category.
4. If you are configuring root pipes, you can specify the white list settings based on the descrip-
tion of configuring conditions.
The following configurations controls the traffic that flows from the
source to the destination. For the traffic that matches the conditions,
the system will perform the corresponding actions.
Pipe Band- When configuring the root pipe, specify the pipe band-
width width. When configuring the sub pipe, specify the max-
imum bandwidth and the minimum bandwidth of the
pipe:
Limit by When the Limit type is Limit Per IP or Limit Per User,
you need to specify the minimum bandwidth or the max-
imum bandwidth:
Advanced
Limit Oppos- Click the check box to configure the value of limit
ite Band- strength. The smaller the value, the smaller the limit. By
width default, this function is disabled. This function can make
that the actual bandwidth of traffic matches the band-
width allocated by users in order to reduce the packet
loss in the managed device.
The following configurations controls the traffic that flows from the des-
tination to the source. For the traffic that matches the conditions, the
system will perform the corresponding actions.
Pipe Band- When configuring the root pipe, specify the pipe band-
width width. When configuring the sub pipe, specify the max-
imum bandwidth and the minimum bandwidth of the
pipe:
Limit by When the Limit type is Limit Per IP or Limit Per User,
you need to specify the minimum bandwidth or the max-
imum bandwidth:
TrafficClass Specify the value of the TrafficClass field for IPv6 traffic,
The TrafficClass field value of IPv6 traffic matching suc-
cessfully will be set to the specified value. The value
range is 0 to 255.
Limit Oppos- Click the check box to configure the value of limit
ite Band- strength. The smaller the value, the smaller the limit. By
width default, this function is disabled. This function can make
6. In the Schedule tab, configure the time period when the pipe will take effect. Select the
schedule from the drop-down list, or create a new one.
NAT
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
2. From the device navigation pane, click the device you want to configure a SNAT rule.
3. From the object navigation pane, click SNAT. The main window shows the SNAT rule list.
4. From the toolbar of the SNAT rules list, click New. The SNAT Configuration page appears.
In the Basic tab in the SNAT Configuration dialog, configure the SNAT basic options.
l Type: Specify the type of the SNAT rule, including IPv4, NAT46, NAT64 and IPv6.
The configuration options for different types of SNAT rules may vary in this page,
please refer to the actual page.
l Ingress: Specify the ingress traffic of the source NAT rule. The default ingress is all
traffic.
All Traffic: Specify the ingress traffic of the source NAT rule is all traffic. The traffic
from any interface will match the source NAT rule.
Ingress Interface: Specify the ingress interface of traffic in the source NAT rule.
Select an interface from the drop-down list. Only the traffic flowing from the con-
figured ingress interface will match the source NAT rule.
l Service: Select the service you need from the Service drop-down list.
l Translated to
l Static : Static mode means one-to-one translation. This mode requires the
translated address entry to contain the same number of IP addresses as
that of the source address entry.
l Track: Select the check box to enable the Track function and select a track object
from the drop-down list.
l HA Group: Specify the HA group that the SNAT rule belongs to. The default setting
is 0.
l NAT Log: Select the Enable check box to enable the log function for this SNAT rule
(generating log information when there is traffic matching to this NAT rule).
l Rule Position: Specify the position of the rule. Each SNAT rule has a unique ID.
When traffic flowing into the device, the device will search SNAT rules by sequence,
and then implement NAT on the source IP of the traffic according to the first
matched rule. The sequence of the ID showed in the SNAT rule list is the order of
the rule matching. Select one of the following items from the drop-down list:
Bottom - The rule is located at the bottom of all the rules in the SNAT rule list. By
l ID: Specify the method you get the rule ID. It can be automatically assigned by sys-
tem or manually assigned by yourself. If you click Manually assign ID, you should
type an ID number into the box behind.
5. Click OK to save your settings. The new SNAT rule will be shown in the SNAT rule list.
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
2. From the device navigation pane, click the device you want to edit or delete a SNAT rule.
3. From the object navigation pane, click SNAT. The main window shows the SNAT rule list.
4. Select the SNAT rule you want to edit/delete from the SNAT rules list.
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
3. From the object navigation pane, click DNAT. The main window shows the DNAT rule
list.
4. From the toolbar of DNAT rules list, click New>IP Mapping, then IP Mapping Con-
figuration page appears.
l HA Group: Specify the HA group that the DNAT rule belongs to. The default setting
is 0.
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
2. From the device navigation pane, click the device you want to configure a port mapping
rule.
3. From the object navigation pane, click DNAT. The main window shows the DNAT rule
list.
4. From the toolbar of DNAT rules list, click "New>Port Mapping", then Port Mapping Con-
figuration page appears.
l HA Group: Specify the HA group that the DNAT rule belongs to. The default setting
is 0.
l Service: Select the service you need from the Service drop-down list.
l Destination Port: Specify translated port, type the port number into the box.
5. Click OK to save your settings. The new DNAT rule will be shown in the DNAT rules list.
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
2. From the device navigation pane, click the device you want to configure an advanced
DNAT rule.
3. From the object navigation pane, click DNAT. The main window shows the DNAT rule
list.
In the Basic tab in the DNAT Configuration dialog, configure the DNAT basic options.
l Server: Select the service you need from the Service drop-down list.
l Action: Specify the action for the traffic you specified, including:
NAT - Implements NAT for the eligible traffic.
Translated to: For the NAT option, you need to specify the translated IP address.
Select an address entry or SLB server pool from the Translated to drop-down list or
type an IP address in the Translated to box or type an IP address and netmask in the
Translated to box.
NAT Port: Select the Enable check box and type the translated port number into the
l Ping Track: Select the Enable check box to enable Ping track, which means the sys-
tem will send Ping packets to check whether the Intranet servers are reachable.
l TCP Track: Select the Enable check box to enable TCP track, which means the sys-
tem will send TCP packets to check whether the TCP ports of Intranet servers are
reachable.
l TCP Port: Specify the port number. The value range is 1 to 65535.
l NAT Log: Select the Enable check box to enable the log function for this DNAT rule
(generating log information when there is traffic matching to this NAT rule).
l HA Group: Specify the HA group that the DNAT rule belongs to. The default setting
is 0.
l Rule Position: Specify the position of the rule. Each DNAT rule has a unique ID.
When traffic flowing into the device, the device will search DNAT rules by sequence,
and then implement NAT on the destination IP of the traffic according to the first
matched rule. The sequence of the ID showed in the DNAT rule list is the order of
l ID: Specify the method you get the rule ID. It can be automatically assigned by sys-
tem or manually assigned by yourself. If you click Manually assign ID, you should
type an ID number into the box behind.
5. Click OK to save your settings. The new DNAT rule will be shown in the DNAT rules list.
Route
To create a Destination Route Item on the HSM device configuration page, take the following
steps:
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
2. From the device navigation pane, click the device you want to create a destination route
entry.
3. From the object navigation pane, select Network > Route > Destination Route. The Route
items list will appear from the main window below.
4. From the toolbar of the Route items list, click New. The Destination Route Configuration
page appears.
l Next Hop : Click Gateway or Interface or Virtual Router in current VSYS or Virtual
Router in other VSYS button. If Gateway is selected, type the IP address into the
Gateway box below; if Interface is selected, select a name from the Interface drop-
down list below; if Virtual Router is selected, select a name from the Virtual Router
drop-down list below.
l Virtual Router in current VSYS: Select a virtual router from the Virtual Router
drop-down list.
l Virtual Router in other VSYS: Select a virtual router from the Virtual Router
drop-down list.
l Schedule:Specifies a schedule when the rule will take effect. Select a desired sched-
ule from the Schedule drop-down list. After selecting the desired schedules, click the
blank area in this dialog to complete the schedule configuration.
l Precedence: Specify the precedence of route. The smaller the parameter is, the higher
the precedence is. If multiple routes are available, the route with higher precedence
will be prioritized. The value range is 1 to 255. The default value is 1. When the value
is set to 255, the route is invalid.
l Weight: Specify the weight of route. This parameter is used to determine the weight
of traffic forwarding in load balance. The value range is 1 to 255. The default value is
1.
l Description: If necessary, type description information for the route item in this text
box.
5. Click OK to save your settings. The new route item will be shown in the route items list.
To create a Policy Route Item on the HSM device configuration page, take the following steps:
2. From the device navigation pane, click the device you want to create a policy route entry.
3. From the object navigation pane, select Network > Route > Policy-based Routing. The
Route items list will appear from the main window below.
4. From the toolbar of the Route items list, click New, select Policy-based Routing. The
Policy-based Route Configuration dialog appears.
In the Policy-based Route Configuration dialog, configure the policy-based route options.
l Virtual Router: From the Virtual Router drop-down list, select the Virtual Router for
the new route. The default value is "trust-vr".
l Type : Specifies the object type that the policy-based route binds to. You can select
Zone or No Binding .
l Zone: Click this option button and select a zone from the Zone drop-down list.
The zone needs to be bound to the Virtual Router.
5. Click OK to save your settings. The new route item will be shown in the route items list.
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
2. From the device navigation pane, click the device you want to create a policy route rule.
3. From the object navigation pane, select Network > Route > Policy-based Routing. The
Route items list will appear from the main window below.
4. From the toolbar of the Route items list, click New, select Rule. The Policy-based Route
Rule Configuration dialog appears.
ii. Select or type the source addresses based on the selected type.
iv. After adding the desired addresses, click the blank area in this dialog to com-
plete the source address configuration.
You can also perform other operations:
default one, select the any .Click to add any to the right pane.
l User: Specifies a role, user or user group for the PBR rule.
i. From the User drop-down menu, select the AAA server which the users and
user groups belongs to. To specify a role, select Role from the AAA Server
drop-down list.
ii. Based on different types of AAA server, you can execute one or more
actions: search a user/user group/role, expand the user-/user group list, enter
the name of the user/user group.
iii. After selecting users/user groups/roles, click to add them to the right
panes.
iv. After adding the desired objects, click the blank area in this dialog to com-
plete the user configuration.
ii. Select or type the destination addresses based on the selected type.
l When selecting the Address Book type, you can click Add to create a
new address entry.
this default one, select the any .Click to add any to the right pane.
Other
i. From the Service drop-down menu, select a type: Service, Service Group.
ii. You can search the desired service/service group, expand the service/ ser-
vice group list.
iii. After selecting the desired services/service groups, click to add them to
default one, select the any .Click to add any to the right pane.
i. From the Application drop-down menu, you can search the desired applic-
ation, expand the list of applications.
ii. After selecting the desired applications, click to add them to the right
panes.
l Schedule: Specifies a schedule when the PBR rule will take effect. Select a desired
schedule from the Schedule drop-down list. After selecting the desired schedules,
click the blank area in this dialog to complete the schedule configuration.To create a
new schedule, click New Schedule.
l Record log: Select the Enable check box to enable the logging function for PBR
rules.
6. Click OK to save your settings. The new route item will be shown in the route items list.
Set Next-hop: To specify the type of next hop, click IP Address or Interface.
l IP Address: Click this option button and enter IP address into the IP Address text box.
l Interface: Click this option button and select an interface from the Interface drop-down list
and specify the weight into the Weight text box.
Track Object: Select the track object from the drop-down list. See "Track Object" .
Weight: Specifies the weight for the next hop. If a PBR rule is configured with multiple next
hops, system will distribute the traffic in proportion to the corresponding weight.
Add: Click to add the specified next hop.
LLB
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
2. From the device navigation pane, click the device you want to create a LLB profile.
3. From the object navigation pane, select Network > LLB > Profile. The LLB profiles list
will appear from the main window below.
4. From the toolbar of the LLB profiles list, click New. The LLB Profile Configurion dialog
appears.
Profile Name: Specifies the Profile name whose length range is 1-95 characters.
Bandwidth Utilization: Specifies the bandwidth utilization threshold of the interface.
When the rate does not exceed the threshold by the interface bandwidth, the system will
only analysis delay, jitter and packet loss rate to dynamically adjust the routing link; when
the rate exceeds the threshold by the interface bandwidth, system will analysis of each link
bandwidth utilization rate of the parameters at the same time to adjust the routing method.
Value ranges from 0 to 100 (0% to 100%) and defaults to 60.
l High Performance - In this mode, system adjusts link to keep the link balance as fast
as possible.
l High Compatibility - When the link loadchanges, system does not switch the link fre-
quently, but ensures that the service is as far as possible on the previous link. This
mode is suitable for services that are sensitive to link switching, such as banking ser-
vices, only when the previous link is overloaded.
5. Click OK.
To create a LLB rule on the HSM device configuration page, take the following steps:
1. Log into HSM, click Configuration > Device Configuration from the Level-1 navigation
pane to enter the device configuration page.
2. From the device navigation pane, click the device you want to create a LLB rule.
3. From the object navigation pane, select Network > LLB > Rule. The LLB rules list will
appear from the main window below.
4. From the toolbar of the LLB rules list, click New. The LLB Config Policy dialog appears.
l Destination Route - When this option is selected, specify the virtual router and des-
tination address of the destination route.
l Policy Based Routing - Select this option to specify the name and id of the policy
route.
5. Click OK.
Configuration Management
l Specifying Configuration: Specify the shared rule on the device configuration page to a certain
device.
l Snapshot Management: Create a snapshot to back up the current configuration of the selected
device.
Synchronizing Configuration
HSM can get the policy configuration of a device, and also, you can configure the policy of the
device on HSM. After the policy is modified on HSM or on the local device, the device con-
figuration saved on HSM will be not the same as local. In this case, you can decide whether to syn-
chronize the configuration according to the differences.
The icons shown in the device navigation pane indicate the differences:
detailed changes will be shown when the mouse hovers over the icon.
l : Configurations are not the same. The configuration on the local device has been modified.
The detailed changes will be shown when the mouse hovers over the icon.
On HSM, you can synchronize the configuration by two ways, they are:
l Deploy Configuration: Deploy the HSM configuration to the device. The configuration on
device will be replaced by the deployed configuration.
HSM provides the function of viewing the latest configuration information of the managed
devices. To read the latest configuration information of the device, take the following steps:
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. In the device navigation pane, right-click on the device, and then select View Latest Con-
figurations from the pop-up menu.
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
3. Click OK on the confirmation dialog. HSM starts to uploading the local configuration to
HSM.
Notes: When you import the local configuration to HSM, if the association rela-
tionship or inheritance relationship between the device and the shared configuration
of the device on HSM is consistent, reserve and directly import the previous rela-
tionship. If not, the tooltip of The relation between shared configuration and
device will be changed, continue? will prompt on the HSM . Click OK, and then
the shared configuration of the device on HSM will be relieved. The imported con-
figuration is private. Click Cancel, and then the configuration of the local device
will be not imported to HSM.
To batch import the local configuration to HSM, take the following steps:
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. In the device navigation pane, right-click and then select Batch Import Configuration from
the pop-up menu. The Batch Import Configuration dialog appears.
4. Specify the import mode. If Immediately is selected, HSM will generate a task and execute
the taks immediately; if Generate Task is selected, HSM will generate a task, and you can
execute the task at the Task Management page. For more information about task, see Task.
5. Click OK.
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. In the device navigation pane, right-click on the device, and then select Deliver Con-
figuration from the pop-up menu. The Deploy Configuration dialog appears.
3. Specify the deployment mode. If Immediately is selected, HSM will generate a task and
execute the taks immediately; if Generate Task is selected, you can execute the tasks by
scheduling or manually. If On Schedule is selected, HSM will execute the task according
the user-defined time. Otherwise, you need execute the task manually in the Task Man-
agement page. You can view the task status and related logs at the Task Management page.
For more information about task, see Task.
4. Click OK.
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. In the device navigation pane, right-click and then select Batch Deploy Configuration from
the pop-up menu. The Batch Deploy Configuration dialog appears.
4. Specify the deployment mode. If Immediately is selected, HSM will generate a task and
execute the taks immediately; if Generate Task is selected, you can execute the tasks by
scheduling or manually. If On Schedule is selected, HSM will execute the task according
the user-defined time. Otherwise, you need execute the task manually in the Task Man-
agement page. You can view the task status and related logs at the Task Management page.
For more information about task, see Task.
5. Click OK.
Specifying Configuration
On HSM, the shared rule on the device configuration page can be specified to a certain device.
After specifying configuration to the device, the binding relationship between the device and con-
figuration is changed. However, you still have to deploy the specified configuration to the device
if you want the configuration take effect on the device. For more detailed information about
deploying configuration, see Synchronizing Configuration.
To specify a policy, take the following steps:
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. In the device navigation pane, right-click on the decice you want to specify a policy on, and
then select Specify Configuration>Specify Policy from the pop-up menu. The Specify
3. Choose a shared policy from the Choose a Shared Policy selective box for the device. If you
want to maintain the policy on the device as a private policy, select the Copy as a Private
Policy check box.
4. Click OK.
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. In the device navigation pane, right-click on the decice you want to specify a SNAT on, and
then select Specify Configuration>Specify SNAT from the pop-up menu. The Specify
SNAT dialog appears.
3. Choose a shared SNAT from the Choose a Shared Source NAT selective box for the
device.
4. Click OK.
2. In the device navigation pane, right-click on the decice you want to specify a DNAT on,
and then select Specify Configuration>Specify DNAT from the pop-up menu. The Specify
DNAT dialog appears.
3. Choose a shared DNAT from the Choose a Shared Destination NAT selective box for the
device.
4. Click OK.
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. In the device navigation pane, right-click on the decice you want to specify a destination
route on, and then select Specify Configuration>Specify DRouter from the pop-up menu.
The Specify DRouter dialog appears.
3. Choose a shared destination route from the Choose a Shared Destination Route selective
box for the device.
4. Click OK.
Snapshot Management
On HSM, You can create a snapshot to back up the current configuration of the selected device.
And you can also restore the configurations of the snapshot to HSM according to your need.
To create a snapshot, take the following steps:
1. From the device navigation pane, right-click on the device you want to create a snapshot,
and then select Create Snapshot from the pop-up menu.
1. From the device navigation pane, right-click on the device you want to restore a snapshot,
and then select Restore Snapshot from the pop-up menu.
2. On the Restoring Snapshot dialog, specify a version you want to restore in the Choose a
backup version drop-down list, and then Click Restore.
1. Click Configuration > Device Configuration from the Level-1 navigation pane to enter the
device configuration page.
2. From the device navigation pane, select All Devices and the main window will show all the
devices list. Click Manage from the Snapshot column, Snapshot Management dialog appears.
Description of the options on the dialog:
Create Snapshot: Specify the snapshot name and its description, and click OK.
Locking Configuration
Configuration lock can lock all configurations of the managed device to prevent multiple admin-
istrators from modifying the device configuration simultaneously, in order to avoid confusion.
Once device configurations are locked by one administrator, only this administrator can configure
the device and unlock the device configuration as well, and other administrators can not deploy
the configuration to device during locking period.
Notes:
When HSM manages the HA function of the managed devices, as long as the mas-
ter(slave) device is locked, the slave(master) device will be automatically locked.
When the managed device has been registered and locked on HSM, if it is added
to HA cluster and specified as the slave device, when the HA cluster is syn-
chronized to HSM, its locking status will be decided by that of the master device.
2. In the device navigation pane, click the lock icon after device which you want to lock or
unlock.
When the lock icon is , you can click it to lock device configuration; when the lock icon
After device configurations are locked by one administrator, please be noted that:
l If other administrators move the mouse to the lock icon, the name of locked administrator
will be displayed.
l Not only can the private configuration but also the shared configuration be locked. If the
shared configuration is locked by multiple administrators, no one can modify the shared con-
figuration.
l If the shared object is locked, system will prompt "locked by xxx, operation denied: locked
devices(xxx)" when non-locked administrators modify it; if the shared rule is locked, "Con-
figuration is locked by xxx" will be prompted on the location bar.
l If you cancel the relevant relationship between device and shared configuration, the shared
configuration will be unlocked, and private configuration will be locked.
l All configurations that relevant to device directly or indirectly will be locked, others can not
modify.
l When modifying the private configuration, if new shared configuration is cited, the shared con-
figuration will be locked. Conversely, the shared configuration will be unlocked.
For example, if user A locked configuration of device 1, modify a rule in security policy 1 to
cite shared address entry addr1. After modification, user A has locked addr1.
Notes:
l Only after licenses of the relevant functions had been installed, can cor-
responding functions be configured in HSM.
Zone
To realize the zone-based Anti-Virus and IPS function, take the following steps:
1. Log on to HSM, click Configuration > Device Configuration to enter the device con-
figuration page.
2. From the device navigation pane, select the device whose zone will be configured. From
the object navigation pane, and select Zones. The main window shows the zone entry list.
3. In the zone entry list, click the zone you want to enable the Anti-Virus and IPS function,
and then click Edit from the toolbar. The Zone dialog appears.
Option Description
Anti Virus Select the On check box to enable Anti Virus function.
Select the Anti-Virus rule from the drop-down list. Two
ways can be used to configure an Anti Virus rule:
Intrusion Pro- Select the On check box to enable IPS function. Select
tection the IPS rule from the drop-down list.
defense direction: If IPS function is enabled, you need
configure a direction(bi-direct, egress, ingress) from
defense direction drop-down list. The IPS rule will be
applied to the traffic that is matched with the specified
secuity zone and direction.
5. Click OK.
Address Books
1. Click Configuration > Device Configurationto enter the device configuration page.
2. In the device navigation pane, select the device you want to create address entry, go to the
object navigation pane and select Address Book. The main window shows the address entry
list.
Service Books
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to create service group, go to the
object navigation pane and select Service Books>User-defined Service Group. The main
window shows the service group entry list.
3. Click New from the toolbar. The Service Group dialog appears.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to create service, go to the object
navigation pane and select Service Books > User-defined Service. The main window shows
the user-defined service entry list.
Dst Port: Specify the destination port range of the member. The value range is 1 to
65535.
Src Port: Specify the source port range of the member. The value range is 1 to 65535.
ICMP
Type: Specify the ICMP type value of the member. It can be one of the following: 3
(Destination-Unreachable), 4 (Source Quench), 5 (Redirect), 8 (Echo), 11 (Time
Exceeded), 12 (Parameter Problem), 13 (Timestamp), and 15 (Information).
Min Code: Specify the minimum ICMP code value of the member. The value range is 0
to 5.
Max Code: Specify the maximum ICMP code value of the member. The value range is 0
to 5.
Others
Protocol No.: Specify the protocol number of the member. The value range is 1 to 255.
Application Books
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to create application group,
expand Objects and select Application Books > User-defined Application Group. The main
window shows the user-defined application group information.
3. Click New from the toolbar. The APP Group dialog appears.
Schedules
Creating a Schedule
2. In the device navigation pane, select the device you want to create application group,
expand Objects and select Schedule. The main window shows schedule entry list.
6. In the Absolute Schedule section, specify the start time and end time in which the periodic
schedule will take effect.
7. Click New, and configure a periodic schedule in the dialog as below. The periodic schedule
will take effect repeatedly during the time range specified by the absolute schedule.
Interface
HSM supports how to create, edit and delete a tunnel interface for the managed devices.
1. Click Configuration > Device Configuration to enter the device configuration page.
3. Select Interface in the Object navigation pane. The main window then shows the related
information about the interface and toolbar.
4. Click New Tunnel Interface from the toolbar and the Tunnel Interface dialog box will pop
up.
Option Description
Name
Enable DNS Select this check box to enable DNS proxy for the inter-
Proxy face.
Enable DNS Select this check box to enable DNS bypass function for
Bypass the interface. The function means that if the DNS bypass
is enabled, the DNS packet will be forwarded to the ori-
ginal IP directly when the DNS proxy is disabled.
Tunnel Bind- IPSec VPN: Specifies the name of IPsec VPN bound to
ing the tunnel interface, and then click Add from the Gate-
In the Properties tab, configure properties option for the tunnel interface.
Option Description
In the Advanced tab, configure advanced option for the tunnel interface.
Option Description
2. Select an action:
In the RIP tab, configure RIP option for the tunnel interface.
Option Description
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to create SLB server pool, go to
the object navigation pane and select SLB Server Pool. The main window shows the user-
defined SLB server pool information.
3. Click New from the toolbar. The SLB Server Pool Configuration dialog appears.
Option Description
Name Specify the name of the SLB server pool.You can enter up
to 31 chars.
Member
Member Specify the member of the pool. You can type the IP
range or the IP address and the netmask.
Weight Specify the traffic forwarding weight during the load bal-
ancing. The value ranges from 1 to 255.
Add Add the SLB address pool member to the SLB server
pool.
Track
Port Specify the port number that will be tracked. The value
ranges from 1 to 65535.
Weight Specify a weight for the overall failure of the whole track
rule if this track entry fails. The value range is 1 to 255.
Add Click Add to add the configured track rule to the list.
Threshold Types the threshold for the track rule into the Threshold
box. The value range is 1 to 255. If the sum of weights
for failed entries in the track rule exceeds the threshold,
the security device will conclude that the track rule fails.
Description Types the description for this track rule. You can enter up
to 95 chars.
2. In the device navigation pane, select the device you want to create SLB server pool, go to
the object navigation pane and select SLB Server Pool. The main window shows the user-
defined SLB server pool information.
4. In the Server List tab at the bottom of this page, view the information of the servers that are
in this SLB pool.
5. In the Server List tab, view the retries information of the SLB server pool. The retries
information include IP/mask, port, weight, and maximum sessions.
6. In the Monitoring tab, view the information of the track rules. The track rules information
include track type, prot, interval,and retries.
IPS, the abbreviation for Intrusion Protection System, is designed to monitor various network
attacks in real time and take appropriate actions (like block) against the attacks according to your
configuration. You can view the IPS rules configured in the managed device, including predefined
rules and user-defined rules.
To view the IPS rules configured in the managed device on HSM, take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. From the device navigation pane, select the device you want to veiw the IPS rules.
The firewalls in different versions have different predefined IPS rules, the details are as follows:
no-ips This rule does not include any IPS signatures, that is, no All
intrusion prevention detection is performed.
predef_ This rule includes all IPS signatures and its default action All
default is reset. This rule is suitable for the general deployment
scenarios.
predef_loose This rule includes most of the IPS signatures with high All
severity or high popularity and its default action is log
only. This rule is suitable for the general deployment scen-
arios.
DMZ-server This rule includes all attack detection except TFTP and StoneOS 5.5R5 and
NETBIOS protocols, and its default action is log. This later
rule is suitable for the deployment scenarios with DMZ
servers.
web-server This rule includes all attack detection of all web attacks StoneOS 5.5R5 and
and general detection of SQL injection and XXS injection. later
Its default action is log. This rule is suitable for the deploy-
ment scenarios with web servers.
Windows- This rule includes the detection of attacks against the Win- StoneOS 5.5R5 and
server dows system and its default action is log. This rule is suit- later
able for the deployment scenarios with Windows-based
servers.
General- This rule includes attack detection for vulnerability scan- StoneOS 5.5R5 and
server ning, denial of service attacks and backdoor Trojan. Its later
default action is log. This rule is suitable for the general
deployment scenarios.
Unix-like- This rule includes the detection of attacks against the StoneOS 5.5R5 and
server Linux system and Solaris system. Its default action is log. later
This rule is suitable for the general deployment scenarios
with Unix-based servers.
Intrant-client This rule includes all IPS signatures and its default action From StoneOS 5.5R5
is log. to 5.5R8(including
StoneOS 5.5R5, but
not StoneOS 5.5R8)
predef_crit- This rule includes the detection of high-risk attacks in the StoneOS R5F4、R6F1
ical latest period and its default action is log. This rule is suit- and later
able for the general deployment scenarios or the scenarios
which need key protection.
Avti-Virus
You can enable/disable the Anti-Viurs functin, and configure the global parameters. About con-
figuring Anti-Virus global parameters, see Threat Protection.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to create AV rule, go to the
Objects navigation pane and select Anti-Virus. The main window shows the Anti-Virus rule
list.
3. Click New from the toolbar. The AntiVirus Rule Configuration dialog appears.
4. Click OK.
Notes: By default, according to virus filtering protection level, HSM comes with
three default Anti-Virus rules: predef_low, predef_middle, predef_high. The default
rule is not allowed to edit or delete.
URL Filter
URL filter controls the access to some certain websites and records log messages for the access
actions. URL filter helps you control the network behaviors in the following aspects:
l Access control to certain category of websites, such as gambling and pornographic websites.
l Access control to certain category of websites during the specified period. For example, for-
bid to access IM websites during the office hours.
l Access control to the website whose URL contains the specified keywords. For example, for-
bid to access the URL that contains keyword "game".
Notes: HSM only supports the centralized management of URL filter function
whose NGFW version is 5.5R1 or above.
1. Select Configuration > Device Configuration > Objects > URL Filter Bundle > URL Fil-
ter.
Option Description
Type Specify the type of URL filter rule, including private and
shared.
category.
Predefined URL DB
User-defined URL DB
Besides categories in predefined URL database, you can also create user-defined URL categories,
which provides URL categories for the configurations of URL filter. When identifying the URL
category, the user-defined URL database has a higher priority than the predefined URL database.
System provides three user-defined URL categories by default: custom1, custom2, custom3.
3. Type the category name in the Name text box. URL category name cannot only be a hyphen
(-). And you can create at most 1000 user-defined categories.
4. Type the category description in the Description text box. The value range is 0 to 255 char-
acters.
6. Click Add to add the URL and its category to the table.
Keyword Category
You can customize the keyword category and use it in the URL filter function.
After configuring a URL filter rule, the system will scan traffic according to the configured
keywords and calculate the trust value for the hit keywords. The calculating method is: adding up
the results of times * trust value of each keyword that belongs to the category. Then the system
compares the sum with the threshold 100 and performs the following actions according to the
comparison result:
l If the sum is larger than or equal to category threshold (100), the configured category action
will be triggered;
l If more than one category action can be triggered and there is block action configured, the
final action will be Block;
l If more than one category action can be triggered and all the configured actions are Permit, the
final action will be Permit.
For example, a URL filter rule contains two keyword categories C1 with action block and C2 with
action permit. Both of C1 and C2 contain the same keywords K1 and K2. Trust values of K1 and
K2 in C1 are 20 and 40. Trust values of K1 and K2 in C2 are 30 and 80.
If the system detects 1 occurrence of K1 and K2 each on a URL, then C1 trust value is
20*1+40*1=60<100, and C2 trust value is 30*1+80*1=110>100. As a result, the C2 action is
triggered and the URL access is permitted.
If the system detects 3 occurrences of K1 and 1 occurrence of K2 on a URL, then C1 trust value
is 20*3+40*1=100, and C2 trust value C2 is 30*3+80*1=170>100. Conditions for both C1 and
C2 are satisfied, but the block action for C1 is triggered, so the web page access is denied.
4. Type the category description in the Description text box. The value range is 0 to 255 char-
acters.
5. Specify the keyword, character matching method (simple/regular expression), and trust
value.
8. To delete a keyword, select the keyword you want to delete from the list and click Delete.
Warning Page
The warning page shows the user block information and user audit information.
If the Internet behavior is blocked by the URL filter function, the Internet access will be denied.
The information of Access Denied will be shown in your browser, and some web surfing rules
will be shown to you on the warning page at the same time. See the picture below:
After enabling the block warning function, block warning information will be shown in the
browser when one of the following actions is blocked:
The block warning function is disabled by default. To configure the block warning function:
1. From the device navigation pane, select the device you want to configure the block warning
function.
2. Click Objects > URL Filter Bundle > Warning Page, the Warning Page dialog appears.
Option Description
Redirect page Redirect to the specified URL. Type the URL in the URL
http:// box. You can click Detection to verify whether
the URL is valid.
After enabling the audit warning function, when your network behavior matches the configured
URL filter rule, your HTTP request will be redirected to a warning page, on which the audit and
privacy protection information is displayed. See the picture below:
1. From the device navigation pane, select the device you want to configure the audit warning
function.
2. Select Objects > URL Filter Bundle > Warning Page, the Warning Page dialog appears.
Botnet Defense
Notes: HSM can only manage the botnet defense function of the firewall device
which version is StoneOS 5.5R8P4, 5.5R8F1 and higher versions.
System provides a predefined botnet defense profile "no-botnet-c2-prevention", you cannot edit
or delete it. You can create up to 32 botnet defense profiles.
To configure a botnet defense profile, take the following steps:
3. Select Objects > Botnet Defense > Profile. The main window will display the botnet
defense profiles configured in the device.
4. Click New in the toolbar. The Botnet Defense Rule Configuration dialog appears.
Type Specify the type of the botnet defense profile, including Private and
Shared.
Name Specify the name of the botnet defense profile. The length of the
name is 1 to 31 characters.
Protocol Type Specify the protocol types (TCP, HTTP, DNS) you
want to scan and specifies the action the system will
take after the botnet is found.
5. Click OK.
To convert the private object to shared object, enter the corresponding page, select the private
object, and then click Convert to Shared from the toolbar.
HSM can check whether the object is referenced by rules or other objects. To view the reference
information of an object, take the following steps:
1. From the device navigation pane, select the device you want to view the reference inform-
ation.
2. From the object navigation pane, select the object type, the main window shows the
detailed information of the object.
3. From the object table, click View in the Referenced by column. The security device shows
the Referenced by dialog of the corresponding object.
HSM records the operations you have made to the objects, for example, editing a service, adding a
member, etc. To view the operation records, take the following steps:
2. From the object navigation pane, select the object type, the main window shows the
detailed information of the object.
3. From the object table, click in the Operation Record column. The system shows the
To ensure the effectiveness of the objects in the system, HSM provides the Redundant Object
Check function. By using this function, the objects have not been referenced and the objects hav-
ing same elements except names will be listed. You can modify the object based on the checking
result according to your own requirement.
When the system performs the redundant object check function, please note that:
l The application type and timeout value of services are not checked.
To execute the object redundant check function, take the following steps:
1. From the device navigation pane, click Tools > Redundant Object Check.
2. Select the device you want to check and then click Next.
l View Task: Open Task Management page to view the progress of the object redund-
ant check in the task list.
4. Click Save button on the upper right corner to save the PDF format report locally.
VPN
IPSec is a widely used protocol suite for establishing VPN tunnel. IPSec is not a single protocol,
but a suite of protocols for securing IP communications. It includes Authentication Headers
(AH), Encapsulating Security Payload (ESP), Internet Key Exchange (IKE) and some authen-
tication methods and encryption algorithms. IPSec protocol defines how to choose the security
protocols and algorithms, as well as the method of exchanging security keys among com-
munication peers, offering the upper layer protocols with network security services including
access control, data source authentication, data encryption, etc.
l Authentication Header (AH): AH is a member of the IPsec protocol suite. AH guarantees con-
nectionless integrity and data source verification of IP packets, and furthermore, it protects
l Encapsulating Security Payload (ESP): ESP is a member of the IPsec protocol suite. ESP
provides encryption for confidential data and implements data integrity check of IPsec ESP
data in order to guarantee confidentiality and integrity. Both ESP and AH can provide service
of confidentiality (encryption), and the key difference between them is the coverage.
l Internet Key Exchange (IKE): IKE is used to negotiate the AH and ESP password algorithm
and put the necessary key of the algorithm to the right place.
IPsec provides encrypted communication between two peers which are known as IPsec ISAKMP
gateways. There are two ways to set SA, one is manual and another is IKE ISAKMP. HSM sup-
port only IKE ISAKMP. HSM do not support share IP Seck VPN.
IPSec VPN configuration page consists of four pages. They are IKE VPN List, VPN Peer List,
P1 Proposal and P2 Proposal. Take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
3. Select VPN > IPSec VPN in the Objects navigation pane. The main window then displays
the related information about IPSec VPN and toolbar.
4. Click New in the IKE VPN List and the IKE VPN Configuration dialog box will pop up.
Option Description
be Auto or Manual.
Enable Idle Time Select the Enable check box to enable the idle
time function. By default, this function is disabled.
This time length is the longest time the tunnel can
exist without traffic passing through. When the
Commit Bit Select the Enable check box to make the cor-
responding party configure the commit bit func-
tion, which can avoid packet loss and time
difference. However, commit bit may slow the
responding speed.
Auto Connect Select the Enable check box to enable the auto
connection function. By default, this function is
disabled. The device has two methods of estab-
lishing SA: auto and traffic intrigued. When it is
auto, the device checks SA status every 60
seconds and initiates negotiation request when SA
is not established; when it is traffic intrigued, the
tunnel sends negotiation request only when there
is traffic passing through the tunnel. By default,
traffic intrigued mode is used. Note: Auto con-
nection works only when the peer IP is static and
the local device is initiator.
Tunnel Route This item only can be modified after this IKE
VPN Track Select the Enable check box to enable the VPN
track function. The device can monitor the con-
nectivity status of the specified VPN tunnel, and
also allows backup or load sharing between two or
more VPN tunnels. This function is applicable to
both route-based and policy-based VPNs. The
options are:
5. In the VPN Peer List tab, click New and the VPN Peer Configuration dialog box will pop
up.
Option Description
User Key Click Generate. In the Generate the User Key dia-
Generate Route Select the Enable check box to enable the auto
routing function. By default, this function is dis-
abled. This function allows the device to auto-
6. In the P1 Proposal List tab, click New and the Phase1 Proposal Configuration dialog box
will pop up.
Option Description
7. In the P2 Proposal List tab, click New and the Phase2 Proposal Configuration dialog box
will pop up.
Option Description
l Null – No authentication.
l Null – No authentication.
PKI
PKI (Public Key Infrastructure) is a system that provides public key encryption and digital sig-
nature service. PKI is designed to automate secret key and certificate management, and assure the
confidentiality, integrity and non-repudiation of data transmitted over Internet. The certificate of
PKI is managed by a public key by binding the public key with a respective user identity by a trus-
ted third-party, thus authenticating the user over Internet. A PKI system consists of Public Key
Cryptography, CA (Certificate Authority), RA (Certificate Authority), Digital Certificate and
related PKI storage library.
PKI terminology:
l Public Key Cryptography: A technology used to generate a key pair that consists of a public
key and a private key. The public key is widely distributed, while the private key is known
only to the recipient. The two keys in the key pair complement each other, and the data
encrypted by one key can only be decrypted by another key of the key pair.
l CA: A trusted entity that issues digital certificates to individuals, computers or any other
entities. CA accepts requests for certificates and verifies the information provided by the
l RA: The extension to CA. RA forwards requests for a certificate to CA, and also forwards
the digital certificate and CRL issued by CA to directory servers in order to provide dir-
ectory browsing and query services.
l CRL: Each certificate is designed with expiration. However, CA might revoke a certificate
before the date of expiration due to key leakage, business termination or other reasons.
Once a certificate is revoked, CA will issue a CRL to announce the certificate is invalid,
and list the series number of the invalid certificate.
To view the trust domain in the device configuration page, take the follwing steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. Select the device in which you want to view the trust domain.
3. Click PKI > Trust Domain and then main window will display the related information
about trust domain and toolbar.
4. Select the trust domain you want to view, and click View.
Option Description
Basic
Basic
the system.
Subject
User
User refers to the user who uses the functions and services provided by the Hillstone device, or
who is authenticated or managed by the device. The authenticated users consist of local user and
external user. The local users are created by administrators. They belong to different local authen-
tication servers, and are stored in system's configuration files. The external users are stored in
external servers, such as AD server or LDAP server. System supports User Group to facilitate
user management. Users belonging to one local authentication server can be allocated to different
user groups, while one single user can belong to different user groups simultaneously; similarly,
user groups belonging to one local authentication server can be allocated to different user groups,
while one single user group can belong to different user groups simultaneously.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to create local user, go to the
Objects navigation pane and select User> Local User. The main window shows the local
user list.
3. Click New from the toolbar. The User Configuration dialog appears.
Option Description
word
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to create local user group, go to
the Objects navigation pane and select User > Local User. The main window shows the
local user list.
3. Click New > User Group from the toolbar. The User Group Configuration dialog appears.
5. Specifies members for the user group. Expand User or User Group in the Available list,
select a user or user group and click Add to add it to the Selected list on the right. To
delete a selected user or user group, select it in the Selected list and then click Remove.
One user group can contain multiple users or user groups, but system only supports up to
5 layers of nested user groups, and does not support loopback nest, i.e., a user group
should not nest the upper-layer user group it belongs to.
Importing List
You can import a local user binding list or user password list to HSM, and the existing con-
figurations will be updated by the imported configurations. If the imported list contains a user
that does not exist in the system, the user binding rule or user password item will be automatically
created. The list file format must be .txt. If the binding type is IP, the user binding list content
format is "AAA server name, user name, IP, virtual router, 0 or 1"; if the binding type is MAC,
the user binding list content format is "AAA server name , User name, MAC, virtual router, 0 ".
The last bit indicates the whether the check login IP for Webauth user function is enabled. "0"
means no, "1" means yes. User password list content format is "local server name, user name, pass-
word".
To import list on HSM, take the following steps:
2. In the device navigation pane, select the device you want to import list, go to the Objects
navigation pane and select User > Local User. The main window shows the local user list.
3. Click the black triangle to the right of the Import button from the toolbar, and select Import
User Binding List or Import User Password List.
4. Browse the local directory and select the file you want to import.
Exporting List
You can export a local user binding list or user password list to your local PC.
To export list on HSM, take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to export list, go to the Objects
navigation pane and select User > Local User. The main window shows the local user list.
3. Click the black triangle to the right of the Export button from the toolbar, and select Export
User Binding List or Export User Password List.
4. Click OK in the prompt dialog and select the location you want to export.
You can synchronize users in a LDAP server to the Hillstone device. To synchronize users from a
LDAP user, firstly, you need to configure a LDAP server. To configure a LDAP server, see
"AAA Server" on Page 386.
To synchronize users on HSM, take the following steps:
2. In the device navigation pane, select the device you want to synchronize users, go to the
Objects navigation pane and select User > LDAP User. The main window shows the LDAP
user list.
3. Select a server from the LDAP Server drop-down list, and click Sync User from the toolbar.
Importing Binding
You can import a LDAP user binding list to HSM. The list file format must be .txt.
To import list on HSM, take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to import list, go to the Objects
navigation pane and select User > LDAP User. The main window shows the LDAP user
list.
4. Browse the local directory and select the file you want to import.
Exporting Binding
You can export a LDAP user binding list to your local PC.
To export list on HSM, take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to export list, go to the Objects
navigation pane and select User > LDAP User. The main window shows the LDAP user
list.
You can synchronize users in an Active Directory server to the Hillstone device. To synchronize
users from an Active Directory user, firstly, you need to configure an Active Directory server. To
configure an Active Directory server, see "AAA Server" on Page 386.
To synchronize users on HSM, take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to synchronize users, go to the
Objects navigation pane and select User > Active Directory User. The main window shows
the Active Directory user list.
3. Select a server from the Active Directory Server drop-down list, and click Sync User from
the toolbar.
Importing Binding
You can import an Active Directory user binding list to HSM. The list file format must be .txt.
To import list on HSM, take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to import list, go to the Objects
navigation pane and select User > Active Directory User. The main window shows the Act-
ive Directory user list.
4. Browse the local directory and select the file you want to import.
Exporting Binding
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to export list, go to the Objects
navigation pane and select User > Active Directory User. The main window shows the Act-
ive Directory user list.
4. Click OK in the prompt dialog and select the location you want to export.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to add user binding, go to the
Objects navigation pane and select User > User Binding.
3. Click Add User Binding from the toolbar. The IP MAC Binding dialog appears.
User
User Select a user for the binding from the drop-down list.
Binding Type
Binding Type By specifying the binding type, you can bind the user
to a IPv4/IPv6 address or MAC address. In a virtual
router, the same IP or MAC address can only be bound
to one user. One user can bind multiple MAC
addresses.
Importing List
You can import a user binding list to HSM.
To import list on HSM, take the following steps:
2. In the device navigation pane, select the device you want to import list, go to the Objects
navigation pane and select User > User Binding.
4. Browse the local directory and select the file you want to import.
Exporting List
You can export a user binding list to your local PC.
To export list on HSM, take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to export list, go to the Objects
navigation pane and select User > User Binding.
4. Click OK in the prompt dialog and select the location you want to export.
Role
Roles are designed with certain privileges. For example, a specific role can gain access to some spe-
cified network resources, or make exclusive use of some bandwidth. In StoneOS, users and priv-
ileges are not directly associated. Instead, they are associated by roles.
Creating a Role
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to create role, go to the Objects
navigation pane and select Role > Role. The main window shows the role list.
3. Click New from the toolbar. The Role Configuration dialog appears.
Option Description
Type Specifies the type for new role, including private and
shared.
Role Name Type the role name into the Role Name box.
Description Type the description for the role into the Description
box.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want to associate the role, go to the
Objects navigation pane and select Role > Role. The main window shows the role list.
3. Select a role, and click Mapping To from the toolbar. The Mapping To dialog appears.
Select a role mapping rule from the first drop-down list, and then select a user, user group,
certificate name (the CN field of USB Key certificate) or organization unit (the OU field
of USB Key certificate) from the second drop-down list. If User, User group, CN or OU
is selected, also select or enter the corresponding user name, user group name, CN or OU
into the box behind.
You can associate the role with the user, user group, certificate name, or organization unit. 64 role
mapping rules can be configured, and 256 mapping items can be added in each role mapping rule.
To create a role mapping rule on HSM, take the following steps:
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want, go to the Objects navigation pane
and select Role > Role Mapping. The main window shows the role mapping rule list.
3. Click New from the toolbar. The Role Mapping Configuration dialog appears.
Type : Specifies the type for new role mapping rule, including private and shared.
Mapping Name : Type the name for the role mapping rule.
In the Member section, select a role from the first drop-down list, and then select a user,
user group, certificate name (the CN field of USB Key certificate) or organization unit
(the OU field of USB Key certificate) from the second drop-down list. If User, User
5. If needed, repeat Step 3 and Step 4 to add more mappings. To delete a role mapping, select
the role mapping you want to delete from the mapping list, and click Delete.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want, go to the Objects navigation pane
and select Role> Role Combination. The main window shows the role combination list.
Option Description
First Prefix Specifies a prefix for the first role in the role regular
expression.
First Role Select a role name from the First Role drop-down list to
specify a name for the first role in the role regular expres-
sion.
Second Pre- Specifies a prefix for the second role in the role regular
fix expression.
Second Role Select a role name from the Second Role drop-down list
to specify a name for the second role in the role regular
expression.
Result Role Select a role name from the Result Role drop-down list to
specify a name for the result role in the role regular expres-
sion.
AAA Server
An AAA server is a server program that handles user requests for access to computer resources
and, for an enterprise, provides authentication, authorization, and accounting (AAA) services. The
AAA server typically interacts with network access and gateway servers and with databases and dir-
ectories containing user information.
Here in system, authentication supports the following five types of AAA server:
l Local server: a local server is the firewall itself. The firewall stores user identity information
and handles requests. A local server authentication is fast and cheap, but its storage space is
limited by the firewall hardware size.
l External servers:
l Radius server
l LDAP server
l TACACS+ server
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want, go to the Objects navigation pane
and select AAA Server.
3. Click New from the toolbar. The Local Server Configuration dialog appears.
Option Description
Type Specifies the type for new local server, including private
and shared.
Server Name Type the name for the new server into the text box.
Role Mapping Specifies a role mapping rule for the server. With this
Rule option selected, system will allocate a role for users who
have been authenticated to the server according to the
specified role mapping rule.
Change Pass- If needed, select the Enable checkbox. With this func-
word tion enabled, the system allows users to change their
own passwords after the successful WebAuth or SCVPN
authentication.
Click the View link in the AAA server's Reference By column to view all objects that reference the
AAA server. Click the Remove link in Remove Relationship column of each tab to release the ref-
erence relationship between this AAA server and the corresponding object.
2. In the device navigation pane, select the device you want, go to the Objects navigation pane
and select AAA Server.
3. Click the black triangle to the right of the New button from the toolbar, and select Radius
Server. The Radius Server Configuration dialog appears.
Basic Configuration
Password Specifies a password for the Radius server. You can spe-
cify at most 31 characters.
Optional
Role Mapping Specifies a role mapping rule for the server. With this
Rule option selected, system will allocate a role for users
who have been authenticated to the server according to
the specified role mapping rule.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want, go to the Objects navigation pane
and select AAA Server.
3. Click the black triangle to the right of the New button from the toolbar, and select Active
Optional
Role Mapping Specifies a role mapping rule for the server. With this
Rule option selected, system will allocate a role for users
who have been authenticated to the server according
to the specified role mapping rule.
Automatic Syn- Click the radio button to specify the automatic syn-
chronization chronization.
berOf=CN=Admin,DC=test,DC=com”,which
manifests that the system only can synchronize or
authenticate user whose DN is “mem-
berOf=CN=Admin,DC=test,DC=com”. The com-
monly used operators are: =(equals a value)、&
(and)、|(or)、!(not)、*(Wildcard.Matches zero or
more charactors.)、~=( fuzzy query.)、>=(Be
equal or greater than a specified value in lex-
icographical order.)、<=( Be equal or less than a spe-
cified value in lexicographical order.).
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want, go to the Objects navigation pane
and select AAA Server.
3. Click the black triangle to the right of the New button from the toolbar, and select LDAP
Optional
Role Mapping Specifies a role mapping rule for the server. With this
Rule option selected, system will allocate a role for users
who have been authenticated to the server according to
the specified role mapping rule.
Automatic Syn- Click the radio button to specify the automatic syn-
chronization chronization.
range is 30 to 1440
minutes. The default value
is 30.
User Filter Specifies the user filters, the system can only syn-
chronize and authenticate users that match the filters
on the authentication server. The length is 0 to 120
characters. For example, if the condition is configured
to “(|(objectclass=inetOrgperson)(object-
class=person))”,which manifests that the system only
can synchronize or authenticate users which are defined
as inetOrgperson or person. The commonly used oper-
ators are as follows: =(equals a value)、&(and)、|
(or)、!(not)、*(Wildcard. Matches zero or more char-
acters.)、~=( fuzzy query.)、>=(Be equal or greater
than a specified value in lexicographical order.)、<=(
Be equal or less than a specified value in lexicographical
order.).
Naming Attrib- Specifies a naming attribute for the LDAP server. The
ute default naming attribute is uid.
Member Attrib- Specifies a member attribute for the LDAP server. The
Group Class Specifies a group class for the LDAP server. The
default class is groupofuniquenames.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want, go to the Objects navigation pane
and select AAA Server.
3. Click the black triangle to the right of the New button from the toolbar, and select
Basic Configuration
Optional
Role mapping Select a role mapping rule for the server. With this option
rule selected, system will allocate a role for users who have
been authenticated to the server according to the spe-
cified role mapping rule.
Track Object
The devices provide the track object to track if the specified object (IP address or host) is reach-
able or if the specified interface is connected. This function is designed to track HA and inter-
faces.
1. Click Configuration > Device Configuration to enter the device configuration page.
2. In the device navigation pane, select the device you want, go to the Objects navigation pane
and select Track Object.
Option Description
Threshold Type the threshold for the track object into the text box.
Track Type Select a track object type. Only support for interface.
drop-down list.
4. Click OK.
l Global Configuration
l Global Object
Global Configuration
Click Configuration > Global Configuration to enter the global configuration page. In this page,
you can create, edit, delete the shared or private rules. The shared rules can be used by all devices.
After configuring the shared rules, you have to deploy the shard rules to the managed device if
you want to take effect on the device. For more detailed information about deploying con-
figuration, see Synchronizing Configuration.
The related configurations are:
l Policy
l iQoS
l Route
l Configuration Bundle
Policy Configuration
To create a shared policy on the HSM global configuration page, take the following steps:
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select device types tab, then expand Configure and Security
Policy nodes.
3. From the toolbar, click New. The Shared Policy Configuration dialog appears.
4. Click OK. The new policy will be shown in the policy list.
5. Click on the policy name in the policy list or select the newly added policy from the con-
figuration navigation pane to enter the rule editing page.
6. Configure rules for the policy. For the detailed information about how to configure, see "
Rule Configuration" on Page 412.
After selecting a policy in the policy list, you can click the Edit button from the toolbar to edit
the shared or private policy, and click the Delete button to delete the shared policy.
Notes: The newly created policy only exists on HSM before the deployment, even
though you have specified devices for the policy, it will not take effect on the spe-
cified devices.
Rule Configuration
In the global configuration page, click Security Policy > Shared/Private from the configuration
navigation pane, then select a shared or private policy to enter the policy configuration page. For
the details about how to create, please refer to "Creating a Policy Rule" on Page 228 in Device
Configuration.
Notes: HSM supports to copy shared policy rules to private or shared policy, but
does not support to copy private policy rules to shared policy or another private
policy.
In the global configuration page, click Security Policy > Shared/Private from the configuration
navigation pane, then select a shared or private policy to enter the policy configuration page. For
the details about how to create, please refer to "Creating a Rule Group" on Page 236 in Device
Configuration.
Notes: HSM supports to copy shared policy rule groups to private or shared policy,
but does not support to copy private policy rule groups to shared policy or another
private policy.
please refer to "Moving Rules and Groups" on Page 238 in Device Configuration.
To view operation record of policy rule and rule group, take the following steps:
1. Click Configuration > Global Configuration from the Level-1 navigation pane to enter the
global configuration page.
2. In the left navigation pane, select device types tab, then expand Configure and Security
Policy nodes.
3. Click icon in Operation Record column. Operation record dialog for the security policy
appears.
You can view the detailed operation record of rules and rule groups, including add, edit,
delete, paste and so on.
This feature is used to check whether there is useless rule. Select the Rule Conflict Check check
box from the toolbar, system begins to check the conflicts among rules in the policy. When the
checking process is finished, the useless rules will become hatched, and all the rule IDs that over-
shadow the rule will be listed in the last column (shadow) of the rule list. You can select all of the
redundant rules by clicking on the number in brackets after the check box, so that you can delete
them in batches.
You can specify a head policy or a tail policy for a private policy, and specify a head policy for a
shared policy. Through the inheritance relations of policy, one and multiple rules can be applied
on the device. The priority of head policy rules which are applied on the device is higher than the
existing rules on the device, and the priority of tail policy rules is lower than the existing rules on
the device.
To set a head or tail policy for private policy or shared policy, take the following steps:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, select device types tab, then expand Configure and Security
Policy nodes, and then select the policy you want to set head or tail policy from the policy
list.
4. If you choose a private policy, click Set Head Policy or Set Tail Policy from the toolbar.
Select shared policies in the pop-up dialog box.
5. Click OK.
The configuration you just made will be shown in the Head Policy and Tail Policy column.
Notes:
l Only shared policy can be specified to be head or tail policy.
l If a shared policy has been specified as a tail policy for a private policy, it is
not allowed to become the head policy for other policies.
l If a shared policy has been designated as the head policy for a policy, it is not
allowed to become the tail policy for another policy.
l A shared policy which has already been designated with a head policy is not
allowed to become a tail policy for other policies.
In order to make users to understand the relationship of all policies more intuitively, HSM sup-
ports to view policy topology map.
To view the topology map of the policy relationship, take the following steps:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, select device types tab, and then expand Configure and Security
Policy node in turn.
3. Click Relationship View at the top right corner of the main window and view the topology
map of policy relationship.
Topology map shows the relationship of private policies that the current administrator can
access to and all the shared policies. Click Grid View to switch to the original view.
You can enter a policy name in the search box at the top right of the view, and the corresponding
policy will be highlighted. Click Back to Center at the top right of the view, all the security
policies will be displayed in the view. Click Auto Arrange to switch to the topology view. Click
Full Screen to switch to full screen mode. You can also right-click the policy icon to specify the
head policy or tail policy, and mark the policy icon with color (the shared policy can not be des-
ignated with a tail policy).
The HSM system currently supports policy-based anti-Virus, IPS, URL filtering, or viewing sand-
box protection.
To realize the policy-based protection function, take the following steps:
2. In the left navigation pane, select device types tab, then expand Configure and Security
Policy nodes, select the policy which will be edited. The main window shows the policy
entry list.
Option Description
Intrusion Pro- Select the On check box to enable IPS function. Select
tection the IPS rule from the drop-down list. You can select pre-
defined IPS rules or user-defined IPS rules in the man-
aged device. System provides different predefined IPS
rules for firewalls in different versions. For more inform-
ation, see "Intrusion Protection System".
URL Filter Select the On check box to enable URL Filter function.
Select the URL Filter rule from the drop-down list.
According to the actual needs of users, select an URL Fil-
ter rule from the drop-down list, or you can click New
Anti Virus function status which is enabled, displays the IPS function status which is
enabled, displays the URL Filter function status which is enabled, displays the Sand-
iQoS
To create a shared iQoS on the HSM global configuration page, take the following steps:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, expand Configure and iQoS nodes in NGFW tab.
3. From the toolbar, click New. The Add iQoS dialog appears.
Please enter iQoS name in the dialog, Relevant Device and Description are optional.
4. Click OK. The new iQoS will be shown in the iQoS list.
For more information about how to configure iQoS, please refer to iQoS in Device Configuration.
NAT
Creating a SNAT
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, select device types tab, then expand Configure and NAT nodes,
select SNAT or Shared.
3. From the toolbar, click New. The Add Shared SNAT page appears.
4. Click OK. The new SNAT will be shown in the SNAT list.
Editing/Deleting a SNAT
2. In the left navigation pane, select device types tab, then expand Configure and NAT nodes,
select SNAT or Shared. Select the SNAT you want to edit/delete from the NAT list.
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, select device types tab, then expand Configure and NAT nodes,
click Shared or Private. Double-click the SNAT name you want to create SNAT rules from
the SNAT list. The main window shows the SNAT rule list.
3. From the toolbar of the SNAT rules list, click New. The SNAT Configuration page appears.
In the Basic tab in the SNAT Configuration dialog, configure the followings.
l Type: Specify the type of the SNAT rule, including IPv4, NAT46, NAT64 and IPv6.
The configuration options for different types of SNAT rules may vary in this page,
please refer to the actual page.
l Ingress: Specify the ingress traffic of the source NAT rule. The default ingress is all
traffic.
All Traffic: Specify the ingress traffic of the source NAT rule is all traffic. The traffic
from any interface will match the source NAT rule.
Ingress Interface: Specify the ingress interface of traffic in the source NAT rule.
Select an interface from the drop-down list. Only the traffic flowing from the con-
figured ingress interface will match the source NAT rule.
l Service: Select the service you need from the Service drop-down list.
l Translated to
l Static : Static mode means one-to-one translation. This mode requires the
translated address entry to contain the same number of IP addresses as
that of the source address entry.
l Track: Select the check box to enable the Track function and select a track object
from the drop-down list.
l HA Group: Specify the HA group that the SNAT rule belongs to. The default setting
is 0.
l NAT Log: Select the Enable check box to enable the log function for this SNAT rule
(generating log information when there is traffic matching to this NAT rule).
l Rule Position: Specify the position of the rule. Each SNAT rule has a unique ID.
When traffic flowing into the device, the device will search SNAT rules by sequence,
and then implement NAT on the source IP of the traffic according to the first
matched rule. The sequence of the ID showed in the SNAT rule list is the order of
the rule matching. Select one of the following items from the drop-down list:
Bottom - The rule is located at the bottom of all the rules in the SNAT rule list. By
default, the system will put the newly-created SNAT rule at the bottom of all SNAT
rules.
Top - The rule is located at the top of all the rules in the SNAT rule list.
l ID: Specify the method you get the rule ID. It can be automatically assigned by sys-
tem or manually assigned by yourself. If you click Manually assign ID, you should
type an ID number into the box behind.
4. Click OK to save your settings. The new SNAT rule will be shown in the SNAT rules list.
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, select device types tab, then expand Configure and NAT nodes,
click Shared or Private. Double-click the SNAT name you want to edit/delete SNAT rules
from the SNAT list. The main window shows the SNAT rule list.
3. Select the SNAT rule you want to edit/delete from the SNAT rules list.
Creating a DNAT
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
3. From the toolbar, click New. The Add Shared DNAT dialog appears.
4. Click OK. The new DNAT will be shown in the DNAT list.
Editing/Deleting a DNAT
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Expand NAT from the configuration navigation pane, and then select DNAT or Shared.
Double-click the DNAT name you want to create DNAT rules from the DNAT list. The
main window shows the DNAT rule list.
3. From the toolbar of the DNAT rules list, click New > IP Mapping, then IP Mapping Con-
figuration page appears.
l HA Group: Specify the HA group that the DNAT rule belongs to. The default setting
is 0.
4. Click OK to save your settings. The new DNAT rule will be shown in the DNAT rules list.
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Expand NAT from the configuration navigation pane, and then select DNAT or Shared.
Double-click the DNAT name you want to create DNAT rules from the DNAT list. The
main window shows the DNAT rule list.
3. From the toolbar of the DNAT rules list, click New > Port Mapping, then Port Mapping
Configuration page appears.
l HA Group: Specify the HA group that the SNAT rule belongs to. The default setting
is 0.
l Service: Select the service you need from the Service drop-down list.
l Destination Port: Specify translated port, type the port number into the box.
4. Click OK to save your settings. The new DNAT rule will be shown in the DNAT rules list.
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Expand NAT from the configuration navigation pane, and then select DNAT or Shared.
Double-click the DNAT name you want to create DNAT rules from the DNAT list. The
main window shows the DNAT rule list.
3. From the toolbar of the DNAT rules list, click New > Advanced, then DNAT Con-
figuration page appears.
In the Basic tab in the DNAT Configuration dialog, configure the DNAT basic options.
l Server: Select the service you need from the Service drop-down list.
l Action: Specify the action for the traffic you specified, including:
NAT - Implements NAT for the eligible traffic.
Translated to: For the NAT option, you need to specify the translated IP address.
Select an address entry or SLB server pool from the Translated to drop-down list or
type an IP address in the Translated to box or type an IP address and netmask in the
Translated to box.
NAT Port: Select the Enable check box and type the translated port number into the
Port box. The range is 1 to 65535.
Load Balancing: Select the Enable check box to enable the function. Then, traffic will
be balanced to different Intranet servers.
No NAT - Do not implement NAT for the eligible traffic.
l Ping Track: Select the Enable check box to enable Ping track, which means the sys-
tem will send Ping packets to check whether the Intranet servers are reachable.
l TCP Track: Select the Enable check box to enable TCP track, which means the sys-
tem will send TCP packets to check whether the TCP ports of Intranet servers are
reachable.
l TCP Port: Specify the port number. The value range is 1 to 65535.
l NAT Log: Select the Enable check box to enable the log function for this DNAT rule
(generating log information when there is traffic matching to this NAT rule).
l HA Group: Specify the HA group that the DNAT rule belongs to. The default setting
is 0.
l Rule Position: Specify the position of the rule. Each DNAT rule has a unique ID.
When traffic flowing into the device, the device will search DNAT rules by sequence,
and then implement NAT on the destination IP of the traffic according to the first
matched rule. The sequence of the ID showed in the DNAT rule list is the order of
the rule matching. Select one of the following items from the drop-down list:
Bottom - The rule is located at the bottom of all the rules in the DNAT rule list. By
default, the system will put the newly-created DNAT rule at the bottom of all DNAT
rules.
Top - The rule is located at the top of all the rules in the DNAT rule list.
Before ID - Type the ID number into the box. The rule will be located before the ID
you specified.
After ID - Type the ID number into the box. The rule will be located after the ID you
specified.
4. Click OK to save your settings. The new DNAT rule will be shown in the DNAT rules list.
Editing NAT
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Expand NAT from the configuration navigation pane, and then select Shared or Private.
Select the NAT you want to edit from the NAT list.
Private NAT or shared NAT inherit the configuration of the other shared NAT. The inherited
NAT is father NAT which has higher priority than the sub NAT. Through the inheritance rela-
tions of NAT, one and multiple rules can be applied on the device. The priority of rules which are
applied on the device is higher than the existing rules on the device.
When there are multi-level inheritance relationship, the top-level father NAT rules are shown at
the top of the NAT rule list, and then the sub father NAT rules are displayed, and so on, the spe-
cified NAT rules are shown at last. The inherited NAT rules are marked to orange by default, and
they cannot be edited and moved. You can mark the color of NAT to distinguish the inherited
NAT rules, please refer to Viewing Relationship.
To set a father NAT for private NAT or shared NAT, take the following steps:
2. Select NAT from the configuration navigation pane, and then select Shared or Private.
Select the NAT you want to set father NAT from the NAT list.
When SNAT or DNAT is selected, the main window shows the private NAT of device that
the current administrator can access to and all shared NATs; when shared is selected, the
main window shows all of the shared NAT; when private is selected, the main window
shows all the private NAT of device that the current administrator can access to. The Father
NAT column displays the direct father NAT, and the Child NAT column displays all direct
and indirect child NAT.
3. Click Set Father NAT from the toolbar. The Set Father NAT page appears. You can select
NAT which need to set father NAT according to your requirements.
Viewing Relationship
In order to make users to understand the relationship of all NAT more intuitively, HSM supports
to view and edit NAT topology map.
To view the topology map of the NAT inheritance relationship, take the following steps:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Select NAT from the configuration navigation pane, and then select SNAT or DNAT.
3. Click Relationship View at the top right corner of the main window.
Topology map shows the inheritance relationship of private NAT of device that the current
The icon of private NAT is , and the icon of shared NAT is . Private NAT is folded by
default, while the shared NAT is expanded, NAT which has no inherit relationship will be dis-
played in the first level. The hidden private NAT list will be shown when the mouse hovers over
the private icon. If you need to expand the private NAT node, please click the input box on the
top right of the view, all NAT will be displayed, then select the check box in front of the private
NAT that you need to expand and click the blank space.
You can change the inheritance relationship of NAT by editing the topology map. The operations
include:
l Right click on the blank space or shared NAT icon, select New in the pop-up menu to create
a new shared NAT.
l Right click on the private or shared NAT icon, select Edit in the pop-up menu to edit a NAT.
l Right click on the shared NAT icon, select Delete in the pop-up menu to delete a NAT.
l Right click on the private or shared NAT icon, select Cut in the pop-up menu, if select Paste
on shared NAT icon, it means the pasted NAT will inherit this shared NAT; if select Paste on
blank space, it means the pasted NAT will inherit no NAT.
l Right click on the shared NAT icon, select Mark in the pop-up menu to mark color for NAT,
then the NAT name will become the corresponding color.
2. Select NAT from the configuration navigation pane, and then select Shared or Private.
3. Click icon in Operation Record column. Operation record dialog for the NAT appears.
You can view the detailed operation record of rules , including add, edit, delete, setting
father NAT, and so on.
Route
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, select device types tab, then expand Configure and Route nodes.
3. From the toolbar, click New. The Add DRouter dialog appears.
4. Click OK. The new destination route will be shown in the destination route list.
To edit/delete a Destination Route on the HSM global configuration page, take the following
steps:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Expend Route from the configuration navigation pane. Select the destination route you want
to edit/delete from the destination route list.
To create a Route Item on the HSM global configuration page, take the following steps:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Select Route from the configuration navigation pane. Double-click the destination route
name you want to create route item from the destination route items list. The main window
shows the route item list.
3. From the toolbar of the Route items list, click New. The Destination Route Configuration
page appears.
4. Click OK to save your settings. The new route item will be shown in the route items list.
To edit/delete a Route Item on the HSM global configuration page, take the following steps:
2. Select Route from the configuration navigation pane. Double-click the destination route
name you want to edit/delete route item from the destination route list. The main window
shows the route item list.
3. Select the route item you want to edit/delete from the route items list.
Configuration Bundle
Security policy, NAT, and route can be joined in a configuration bundle. When the configuration
bundle is deployed to the device, the security policy, NAT, and route in the configuration bundle
can be deployed at the same time. A configuration bundle can be deployed to one and multiple
devices.
To create a Configuration Bundle on the HSM global configuration page, take the following two
methods:
Method 1:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, select device types tab, then expand Configuration Bundle
nodes.
In the Create Configuration Bundle dialog, configure the configuration bundle options.
4. Click OK. The new configuration bundle will be shown in the configuration bundle table.
5. Click the name of configuration bundle, you can check the content in the configuration
bundle.
Method 2:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Select the configuration which need be added to the configuration bundle from the con-
figuration navigation pane, including security policy, NAT, and route. Right click the
3. In the Create Configuration Bundle dialog appears. Configure the options as below.
4. Click OK. The new configuration bundle will be shown in the configuration bundle table.
You can add the configurations to the configuration bundle according to your requirements. Take
the following steps:
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. Select the configuration which need be added to the configuration bundle from the con-
figuration navigation pane, including security policy, NAT, and route. Right click the
mouse, and click Add to Configuration Bundle.
3. In the Add to Configuration Bundle dialog appears. Configure the options as below.
4. Select a configuration bundle from the drop-down list, then click OK. The configuration
will be joined in the configuration bundle you selected.
2. Select Configuration Bundle from the configuration navigation pane, and then select the con-
figuration bundle you want to copy from the configuration bundle table.
3. Click Copy from the toolbar. The configuration bundle which is copied will be shown in the
configuration bundle table below. For example, the replicated configuration bundle called
"test", system will automatically named it "CopyOftest".
Global Object
The global objects created on the global configuration page are all shared objects, and can be used
by all devices. In the global configuration page, you can create, edit, delete zone, address entry,
service group entry, service group, application group, schedule, virtual router, interface, SLB
server pool, anti virus rule, URL filter, user, role, AAA server and botnet defense global con-
figuration. You can also view shared IPS rules. After configuring the global object, you have to
deploy the global object to the security device if you want to take effect on the device. For more
detailed information about deploying configuration, see Synchronizing Configuration.
Notes:
l If choosing VSYS devices of the device from the relevant device, the shared
object will be relevant to the VSYS devices of the device, not the device
itself.
l Only after licenses of the relevant functions had been installed, can cor-
responding functions be configured in HSM.
You can create zones on HSM, but cannot deploy the created zones to devices successfully.
When the deployed policy contains zones that do not exist in the devices, to avoid mistakes, you
are required to create same zones on the devices before deploying.
To create a shared zone, take the following steps:
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Zone. The zone entry list will
appear on the main window.
3. From the toolbar, click New. The Share Zone dialog appears.
4. Click OK. The new shared zone will be shown in the zone entry list.
Address Books
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Address Books. The main win-
dow shows the address entry list.
3. From the toolbar, click New. The Share Address dialog appears.
Name : Type the name of the address entry in the Name text box.
Description : If necessary, give a description to the address entry in the Description text
box.
Type: Specify the type of the IP address, IPv4 or IPv6.
Member : Select the member type from the drop-down list in the Member tab, and then
type the IPv4 address/mask, IPv4 range, IPv6 address/prefix, IPv6 range or hostname in
the text box or choose another address entry. Click Add to add the member to the mem-
ber entry list. Repeat this step to add multiple members. Click Delete to delete the selec-
ted address entry.
Exclude Member : Specify the exclude member. In the Exclude Member tab, select the
exclude member type from the drop-down list, and then tap the IPv4 address/mask, IPv4
Service Book
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Service Books > User-defined Ser-
vice Group. The main window shows the user-defined service group list.
3. From the toolbar, click New. The Shared Service Group dialog appears.
5. Click OK. The new shared service group entry will be shown in service group list.
6. from the right selective list, and then click the left-arrow button.
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Service Books >User-defined Ser-
vice. The main window shows the user-defined service list.
3. Click New from the toolbar. The Shared Service dialog appears.
TCP/UDP
Type: Specify the ICMP type value of the member. It can be one of the following: 3
(Destination-Unreachable), 4 (Source Quench), 5 (Redirect), 8 (Echo), 11 (Time
Exceeded), 12 (Parameter Problem), 13 (Timestamp), and 15 (Information).
Min Code: Specify the minimum ICMP code value of the member. The value range is 0
to 5.
Max Code: Specify the maximum ICMP code value of the member. The value range is 0
to 5.
Others
Protocol No.: Specify the protocol number of the member. The value range is 1 to 255.
After specifying the values of parameters, click Add to add it to the service. Repeat the
above steps to add multiple members. Click Delete to delete the selected member.
Relevant Device : Specify the devices which you want to make a relationship with the
user-defined service. If choosing VSYS devices of the device, the user-defined service
will be relevant to the VSYS devices of the device, not the device itself. After con-
figuring the user-defined service, you have to deploy the rule to the relevant device if
you want to take effect on the device. For more detailed information about deploying
configuration, see Synchronizing Configuration.
Application Books
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Application Books >User-defined
Application Group. The main window shows user-defined applicaton group list.
3. Click New from the toolbar. The Shared APP Group dialog appears.
Relevant Device: Specify the devices which you want to make a relationship with the
shared application group. If choosing VSYS devices of the device, the shared application
group will be relevant to the VSYS devices of the device, not the device itself. After con-
figuring the shared application group, you have to deploy the rule to the relevant device if
you want to take effect on the device. For more detailed information about deploying con-
figuration, see Synchronizing Configuration.
Schedules
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Schedules. The main window
shows the schedule list.
3. Click New from the toolbar. The Shared Schedule dialog appears.
5. In the Absolute Schedule section, specify the start time and end time in which the periodic
schedule will take effect.
6. Click New, and configure a periodic schedule in the dialog as below. The periodic schedule
will take effect repeatedly during the time range specified by the absolute schedule.
Virtual Router
The function of virtual routeris is same as the real router. Different virtual router has inde-
pendently of the routing list. The system has a default VRouter called "trust-vr". By default, all
three layers security domain will be bound to trust-vr automatically. Both NAT and route need to
be configured on the virtual router. In order to establish the mapping relation between the shared
virtual router and the virtual router on device, the name of virtual router need to be same.
To create a Shared Virtual Router on the HSM global configuration page, take the following steps:
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Virtual Router.
3. From the toolbar, click New. The Share Virtual Router page appears.
4. Click OK. The new shared virtual router will be shown in the virtual router list.
After creating a shared interface, the shared interface can be mapped to interface on one and mul-
tiple devices. In order to establish the mapping relation between the shared interface and the inter-
face on device, the interface name need to be the same.
To create a shared interface on the HSM global configuration page, take the following steps:
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Interface.
3. From the toolbar, click New. The Share Interface page appears.
4. Click OK. The new shared interface will be shown in the interface list.
To create a shared SLB server pool on HSM, take the following steps:
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > SLB Server Pool. The main win-
dow shows the user-defined SLB server pool information.
3. Click New from the toolbar. The SLB Server Pool Configuration dialog appears.
4. In the SLB Server Pool Configuration dialog, configure the following options.
Option Description
Name Specify the name of the SLB server pool.You can enter
up to 31 chars.
Algorithm Select an algorithm for load balancing, including:
Description Type the description for this track rule. You can enter
up to 95 chars.
Relevant Specify the devices which you want to make a rela-
Device tionship with the shared SLB server pool. If choosing
VSYS devices of the device, the shared SLB server pool
will be relevant to the VSYS devices of the device, not
the device itself. After configuring the shared SLB
server pool, you have to deploy the rule to the relevant
device if you want to take effect on the device. For
more detailed information about deploying con-
figuration, see Synchronizing Configuration.
1. Log into HSM, click Configuration > Global Configuration from the Level-1 navigation
pane to enter the global configuration page.
2. In the left navigation pane, expand Configure and Objects nodes in NGFW tab, and then
select SLB Server Pool. The main window shows the user-defined SLB server pool inform-
ation.
4. In the Server List tab at the bottom of this page, view the information of the servers that are
in this SLB pool.
5. In the Server List tab, view the retries information of the SLB server pool. The retries
informaton include IP/mask, port, weight, and maximum sessions.
6. In the Monitoring tab, view the information of the track rules. The track rules information
include track type, prot, interval,and retries.
Notes: IPS device does not support the configuration of SLB server pool.
IPS Profile
System shows the global information of IPS rules, that is, you can view the shared IPS rules.
1. Click Configuration > Global Configuration > NGFW to enter the global configuration
page.
2. In the left navigation pane, select Configure > Objects > IPS Profile. The main window
shows the IPS rule list. In the New Version tab, system displays the predefined IPS rules
Applicable Software
Name Description
Version of StoneOS
no-ips This rule does not include any IPS signatures, that is, no All
intrusion prevention detection is performed.
predef_ This rule includes all IPS signatures and its default action All
default is reset. This rule is suitable for the general deployment
scenarios.
predef_loose This rule includes most of the IPS signatures with high All
severity or high popularity and its default action is log
only. This rule is suitable for the general deployment scen-
arios.
DMZ-server This rule includes all attack detection except TFTP and StoneOS 5.5R5 and
NETBIOS protocols, and its default action is log. This later
rule is suitable for the deployment scenarios with DMZ
servers.
web-server This rule includes all attack detection of all web attacks StoneOS 5.5R5 and
and general detection of SQL injection and XXS injection. later
Its default action is log. This rule is suitable for the deploy-
ment scenarios with web servers.
Windows- This rule includes the detection of attacks against the Win- StoneOS 5.5R5 and
server dows system and its default action is log. This rule is suit- later
able for the deployment scenarios with Windows-based
servers.
General- This rule includes attack detection for vulnerability scan- StoneOS 5.5R5 and
server ning, denial of service attacks and backdoor Trojan. Its later
default action is log. This rule is suitable for the general
deployment scenarios.
Unix-like- This rule includes the detection of attacks against the StoneOS 5.5R5 and
server Linux system and Solaris system. Its default action is log. later
This rule is suitable for the general deployment scenarios
with Unix-based servers.
Intrant-client This rule includes all IPS signatures and its default action From StoneOS 5.5R5
is log. to 5.5R8(including
StoneOS 5.5R5, but
not StoneOS 5.5R8)
predef_crit- This rule includes the detection of high-risk attacks in the StoneOS R5F4、R6F1
ical latest period and its default action is log. This rule is suit- and later
able for the general deployment scenarios or the scenarios
which need key protection.
Anti-Virus
You can enable or disable the Anti-Virus function, and configure the global parameters.
1. Log into HSM, click Configuration > Global Configuration > NGFW/NIPS/IDS to enter
the global configuration page.
2. In the left navigation pane, select Configure > Objects > Anti-Virus. The main window
shows the Anti-virus rule list.
4. Click OK.
Notes: By default, according to virus filtering protection level, HSM comes with
three default virus filtering rules: predef_low, predef_middle, predef_high. Depend-
ing on the different filtering rules, file types and protocol types can be filtered also
different. The higher the Anti Virus filtering rule is, the higher security level is. The
default rule is not allowed to edit or delete.
To enable the policy-based Anti-Virs on HSM, see configuring the policy-based protection func-
tion.
URL Filter
URL filter controls the access to some certain websites and records log messages for the access
actions. URL filter helps you control the network behaviors in the following aspects:
l Access control to certain category of websites, such as gambling and pornographic websites.
l Access control to certain category of websites during the specified period. For example, for-
bid to access IM websites during the office hours.
Notes: HSM only supports the centralized management of URL filter function
whose NGFW version is 5.5R1 or above.
1. Select Configuration > Global Configuration > NGFW/NIPS/IDS > Objects > URL Fil-
ter Bundle > URL Filter.
Option Description
Predefined URL DB
User-defined URL DB
Besides categories in predefined URL database, you can also create user-defined URL categories,
which provides URL categories for the configurations of URL filter. When identifying the URL
category, the user-defined URL database has a higher priority than the predefined URL database.
System provides three user-defined URL categories by default: custom1, custom2, custom3.
3. Type the category name in the Name text box. URL category name cannot only be a hyphen
(-). And you can create at most 1000 user-defined categories.
4. Type the category description in the Description text box. The value range is 0 to 255 char-
acters.
6. Click Add to add the URL and its category to the table.
8. To delete an existing one, select its check box and then click Delete.
Keyword Category
Keyword can be grouped into different categories. URL filter that contains keyword category will
control the access to websites of certain categories.
When a URL filter rule includes keyword category, the system will scan traffic according to the
configured keywords and calculate the trust value for the hit keywords. The calculating method is:
adding up the results of times * trust value of each keyword that belongs to the category. Then
the system compares the sum with the threshold 100 and performs the following actions accord-
ing to the comparison result:
l If the sum is larger than or equal to category threshold (100), the configured category action
will be triggered;
l If more than one category action can be triggered and there is block action configured, the
final action will be Block;
l If more than one category action can be triggered and all the configured actions are Permit, the
final action will be Permit.
For example, a URL filter rule contains two keyword categories C1 with action block and C2 with
action permit. Both of C1 and C2 contain the same keywords K1 and K2. Trust values of K1 and
K2 in C1 are 20 and 40. Trust values of K1 and K2 in C2 are 30 and 80.
If the system detects 1 occurrence of K1 and K2 each on a URL, then C1 trust value is
20*1+40*1=60<100, and C2 trust value is 30*1+80*1=110>100. As a result, the C2 action is
triggered and the URL access is permitted.
If the system detects 3 occurrences of K1 and 1 occurrence of K2 on a URL, then C1 trust value
is 20*3+40*1=100, and C2 trust value C2 is 30*3+80*1=170>100. Conditions for both C1 and
C2 are satisfied, but the block action for C1 is triggered, so the web page access is denied.
1. Select Object > URL Filter Bundle > Keyword Category. The Keyword Category dialog
appears.
4. Type the category description in the Description text box. The value range is 0 to 255 char-
acters.
5. Specify the keyword, character matching method (simple/regular expression), and trust
value.
9. Specify the deployment device for the keyword category in the Relevant Device drop-down
menu if necessary.
Warning Page
3. Click OK.
You can also click Edit in the toolbar to edit the selected page, and click Delete to delete
the page.
The warning page shows the user block information and user audit information.
If the Internet behavior is blocked by the URL filter function, the Internet access will be denied.
The information of Access Denied will be shown in your browser, and some web surfing rules
will be shown to you on the warning page at the same time. See the picture below:
After enabling the block warning function, block warning information will be shown in the
browser when one of the following actions is blocked:
1. Click Object > URL Filter Bundle > Warning Page, choose the page you want to configure
the block warning function in left page list.
Option Description
Redirect page Redirect to the specified URL. Type the URL in the URL
http:// box. You can click Detection to verify whether
the URL is valid.
After enabling the audit warning function, when your network behavior matches the configured
URL filter rule, your HTTP request will be redirected to a warning page, on which the audit and
privacy protection information is displayed. See the picture below:
The audit warning function is disabled by default. To configure the audit warning function:
1. Select Object > URL Filter Bundle > Warning Page, choose the page you want to configure
the audit warning function in left page list.
Role
To configure shared roles, click Configuration > Global Configuration> NGFW > Configure >
Objects >Role, and select the target node for the next configuration.
For the detailed configuration, see "Role" on Page 380 in Device Object.
AAA Server
To configure shared AAA servers, click Configuration > Global Configuration > NGFW > Con-
figure > Objects > AAA Server nodes in turn.
For the detailed configuration, see "AAA Server" on Page 386 in Device Object.
Notes: HSM can only manage the botnet defense function of the firewall device
which version is StoneOS 5.5R8P4, 5.5R8F1 and higher versions.
System provides a predefined shares botnet defense profile "no-botnet-c2-prevention", you can-
not edit or delete it. You can create up to 32 shared botnet defense profiles.
To configure a shared botnet defense profile, take the following steps:
1. Select Configuration > Global Configuration > NGFW > Objects > Botnet Defense > Pro-
file.
2. Click New in the main window to open the Botnet Defense Rule Configuration dialog .
Name Specify the name of the botnet defense profile. The length of the
name is 1 to 31 characters.
Protocol Type Specify the protocol types (TCP, HTTP, DNS) you want to scan and
specifies the action the system will take after the botnet is found.
Relevant Device Specify the devices which you want to make a relationship with the
botnet defense profile. If choosing VSYS devices of the device, the
rule will only be relevant to the root VSYS. After configuring the rule,
you have to deploy the rule to the relevant device if you want to take
effect on the device. For more detailed information about deploying
configuration, see Synchronizing Configuration.
Editing/Deleting an Object
To edit or delete an object, enter the corresponding object page, select the object, and then click
the Edit or Delete button. For how to enter the object page and the description of the options of
each object, see the creating object sections.
Notes: Only shared virtual router and shared interface can be edited or deleted.
Creating a Business
To treating a business, take the following steps:
2. Click Add.
Option Description
Priority Specify the route priority of the link where the headquar-
ters device is located, including Regardless, High,
Protocol Select the protocol type from the drop-down list, includ-
ing TCP, UDP and ICMP.
Min Destin- Specified the minimum port number of the specified ser-
Max Destin- Specified the maximum port number of the specified ser-
ation Port vice entry.
3. Click OK.
Configuration Example 1
There are the branch device "Spoken1", and headquarters devices "Hub1" and "Hub2". To enable
the branch device "Spoken1" to access the headquarters server "12.12.12.51/24" through a VPN
network, take the following steps.
To create a VPN star network with the devices "Hub1" and "Hub2" as HUB devices, take the fol-
lowing steps:
1. Select VPN > VPN Network > Star Network, and enter the Star Network page.
2. Click New, and in the pop-up New Star Network dialog box, configure as follows:
l Name: Star1
l HUB1 Configuration
3. Click OK.
To add the device "Spoken1" to the VPN star network "Star1", take the following steps:
1. Select Device > SD-WAN Start, and enter the SD-WAN Start page.
2. Click Add Device, and in the pop-up Add Single SD-WAN Device dialog box, configure as
follows:
l Name: Spoken1
l SN: 261030B364521635
l Interface Configuration: Select the WAN Interface tab. Click New, and configure the
WAN1 interface as follows
l Name: WAN1
l Priority: High
l IP Address: 10.90.11.2
l Netmask: 255.255.255.0
l Name: WAN2
l Priority: Low
l IP Address: 10.90.16.2
l Netmask: 255.255.255.0
3. Click OK.
Create an SD-WAN intranet business for the VPN star network "Star1". To create an SD-WAN
business, take the following steps:
1. Select Configuration > SD-WAN Business Deployment, and enter the SD-WAN Business
page.
2. Click Add, and in the pop-up Add dialog box, configure as follows:
l Name: Business1
l Priority: Regardless
l IP:12.12.12.51
l Protocol: ICMP
Click Add, and in the pop-up Add dialog box, configure as follows:
l Name: Business2
l Priority: Medium
l IP:12.12.12.51
l Netmask: 255.255.255.0
l Protocol: ICMP
3. Click OK.
Deploy SD-WAN businesses "Business1" and "Business2" to the device "Spoken1". To deploy an
SD-WAN business, take the following steps:
1. Select Configuration > SD-WAN Business Deployment, and enter the SD-WAN Business
page.
2. Select Business1 and Business2, click Deploy, and select the device "Spoken1" in the pop-
up Deploy dialog box.
3. Click OK.
Result
he branch device "Spoken1" will access the headquarters server "12.12.12.51/24" via the tunnel
link of the WAN1 interface.
There are the branch device "spoken" and the headquarters device "hub". To enable the branch
device "spoken" to access the headquarters server "13.13.13.51/24" through a VPN network,
take the following steps.
To create a VPN star network with the device "hub" the HUB device, take the following steps:
1. Select VPN > VPN Network > Star Network, and enter the Star Network page.
2. Click New, and in the pop-up New Star Network dialog box, configure as follows:
l Name: Star2
3. Click OK.
To add the device "spoken" to the VPN star network "Star2", take the following steps:
1. Select Device > SD-WAN Start, and enter the SD-WAN Start page.
2. Click Add Device, and in the pop-up Add Single SD-WAN Device dialog box, configure as
follows:
l Name: spoken
l SN: 26103EK364522478
l Name: WAN1
l Priority: Regardless
l IP Address: 11.90.11.2
l Netmask: 255.255.255.0
l Name: WAN2
l Priority: High
l IP Address: 11.90.16.2
l Netmask: 255.255.255.0
3. Click OK.
Create an SD-WAN intranet business for the VPN star network "Star2". To create an SD-WAN
business, take the following steps:
1. Select Configuration > SD-WAN Business Deployment, and enter the SD-WAN Business
page.
l Name: Business3
l Priority: Regardless
l IP: 13.13.13.51
l Netmask: 255.255.255.0
l Protocol: ICMP
3. Click OK.
Deploy the SD-WAN business "Business3" to the device "spoken". To deploy an SD-WAN busi-
ness, take the following steps:
1. Select Configuration > SD-WAN Business Deployment, and enter the SD-WAN Business
page.
2. Select Business3, click Deploy, and select the device "spoken" in the pop-up Deploy dialog
box.
3. Click OK.
Result
The branch device "spoken" will access the headquarters server "12.12.12.51/24" via either of
the tunnel links of the WAN1 interface and WAN2 interface.
2. Select the business entry in the list, and view the details under the list.
3. View the devices that have deployed the business in the Activated Devices area. Click
Recycle to recycle the business of the specified device.
4. View the business details in the Configuration area, including name, type, user name and cre-
ate time. Click Script Preview to view the script detail.
Deploying a Business
To deploy a business, take the following steps:
4. Click OK.
Deleting a Business
To delete a business, take the following steps:
Notes:
l If the device has been deployed the business, please recycle the business
first.
1. Select Configuration > Default Parameters, the Configure Parameters dialog pops up.
Option Description
Default Action Specify the action for new security policy rules, including Permit and
Deny.
2. Click OK.
Level-1 navigation pane allows you to navigate to different modules of HSM. For detailed inform-
ation, see Homepage.
Toolbar
Toolbar shows the available tools. Functions of toolbar are described as below:
Main Window
The main window shows the task table. Columns in the task window are described as below:
Status Shows the status of the task. It can be one of the following:
l Failed: Failed to run the task. You can get the failure
reason from the related logs.
Log Click the icon to view the related logs. Logs will be generated
for each executed task. You can also read the logs in the page
of Log > HSM Log > Task Management.
l Ticket Management
l Matching Mode
l Network
Ticket Management
HSM system supports users to configure policy ticket and configuration ticket.
Policy ticket
Users can use network objects to configure matching rules composed corresponding matching
mode of tickets. According to the matching mode configured by users, when the system admin-
istrator processes tickets, system matches the five-tuple information in tickets with network
objects in matching rules, and selects the managed devices that meet the conditions. The system
supports users to manually add devices to be deployed for policy tickets.
Creating a ticket
Ticket 493
1. Select Ticket > Policy Management to enter the security policy ticket page.
2. Click Create Ticket from the toolbar. The Add Ticket dialog appears.
l Source Address: Specify the source address of the policy rules. Select the type of the
address from the drop-down list, type the address and then click Add to add the
address to the list.
l Destination Address: Specify the destination address of the policy rules. Select the
type of the address from the drop-down list, type the address and then click Add to
add the address to the list.
l Protocol/Port: Specify the type of protocol as TCP or UDP, type the port number or
port range and then then click Add to add the port to the list.
l Effective time: Specify the effective time of the polcy rules, always effective or a
period of time
Importing an ticket
1. Select Ticket > Policy Ticket to enter the security policy ticket page.
Ticket 494
3. In the Import Ticket dialog, click Download template to download the template of ticket
files and configure the information.
5. Click Upload.
Processing an Ticket
1. Select Ticket > Policy Ticket to enter the security policy ticket page.
2. In To be Processed tab, click To be Processed in the list, Process Ticket dialog pops up.
3. Select the device needed to deploy the policy rules, click to add it to the right pane.
4. Click Next, enter Security Policy Rule page.select whether to issue the policy rule in the
Redundant Rule Process drop-down list of the Security Policy Rule tab.
l Process Redundant: Select Continue to Deploy or Cancel Deploying the policy rule.
l Policy Location: Select the location from the drop-down list to deploy the rule ,
including Top、Bottom、Before ID and After ID. Select Before ID or After ID, spe-
cify the rule ID in the text box. Then the rule will be deployed before or after the spe-
cified ID. By default, system deploys the rule to the top of the policy list of managed
devices.
5. Click OK.
Ticket 495
Notes:
ticket.
Reviewing a Ticket
1. Select Ticket > Policy Ticket to enter the security policy ticket page.
2. In the To be Checked tab, click To be Checked in the list, Check Ticket dialog pops up.
3. View the detail of configurations in the Check Ticket dialog, including device, management
address and Cli script.
4. Type the handling opinions in the text box, click Approve or Reject. The approved ticket
will be displayed in the To be Deployed tab, and the rejected ticket will be displayed in the
Completed tab.
1. Select Ticket > Policy Ticket to enter the security policy ticket page.
2. In the To be Checked tab, select the tickets needed to check and click Batch Check in the
list.
Ticket 496
3. Click Approve or Reject. The approved ticket will be displayed in the To be Deployed tab,
and the rejected ticket will be displayed in the Completed tab.
Notes:
ticket.
Deploying a Ticket
1. Select Ticket > Policy Ticket to enter the security policy ticket page.
2. Select the ticket needed to be deployed in the To be deployed tab, click To be Deploy from
the toolbar, the Deploy dialog pops up.
3. In the Deploy dialog, select the time to deploy ticket, Immediately or at a specified time.
4. Click OK.
Notes:
Ticket 497
l In the drop-down list, select "All Time" or "User
ticket.
1. Select Ticket > Policy Ticket to enter the security policy ticket page.
2. View the name, created time, remark and created in the Completed tab.
3. Select the ticket needed to view operation record, click , the Operation Record dialog
pops up.
Notes:
ticket.
Ticket 498
Configuration Ticket
Systems supports to accept the configuration pushed through the API, review and deliver it in the
form of a ticket. You can also create a new configuration ticket for delivery.
Creating a ticket
1. Select Ticket > Configuration Ticket to enter the configuration delivery ticket page.
2. Click Create Ticket from the toolbar. The Create Ticket dialog appears.
l Enable Timing Delivery: Click the Enable button to enable the timing delivery func-
tion and specify the time for auto-delivery.
4. Click Next, in the Script Information tab, specify the following configures:
l Edit CLi: Type the command script of the configuration in the Edit CLi text box.
Click Copy button to copy the command. Click "+" button to add command script,
less than 128 scripts can be configured.
l Device: Specify the device for every command script in the drop-down list.
5. Click Submit Review to submit the ticket for review. Click Save Draft to save the ticket.
Processing an Ticket
Ticket 499
1. Select Ticket > Configuration Ticket to enter the configuration delivery ticket page.
2. In To be Processed tab, click button to sumbit the specified ticket in the list. Select mul-
tiple tickets and click Batch submit review to batch submit the specified tickets for review.
l Click button to edit the comments, timing delivery and command sript of the specified
ticket.
l Click button to copy the specified ticket. Rename the ticket in the Copy Ticket dialog
box.
l Click button to delete the specified ticket. Select multiple tickets and click Delete to
Reviewing a Ticket
1. Select Ticket > Configuration Ticket to enter the configuration delivery ticket page.
2. In the To be Checked tab, click button in the list, the Review Ticket dialog pops up.
3. View the detail of configurations in the Review Ticket dialog, including comment, script
information and device.
4. Type the handling opinions in the text box, click Approve, Reject or Discard. The approved
ticket will be displayed in the To be Deployed tab, the rejected ticket will be displayed in
the To be Processed tab and the discarded ticket will be displayed in the Completed tab.
Ticket 500
You can also peform other operations:
l Select multiple tickets and click Batch Review. In the Review Ticket dialog box ,type the
handling opinions in the text box, click Approve, Reject or Discard.
Deploying a Ticket
The ticket will be automatically deployed when timing delivery is configured. The ticket without
configuring timing delivery needed to be deployed manually.
To deploy a ticket, take the following steps:
1. Select Ticket > Configuration Ticket to enter the configuration delivery ticket page.
2. In the To be Deployed tab, Select the tickets needed to be deployed, click Deploy from the
l Click button to terminate the deploying or the ticket that is in undeployed or waiting for
deploying status. Select multiple tickets and click Terminate button on the toolbar to batch
terminate the selected tickets. The ticket that has configured timing delivery and is in
undeployed state will not be automatically deploy when terminated.
1. Select Ticket > Configuration Ticket to enter the configuration delivery ticket page.
2. View the name, created time, comment and state in the Processed tab.
Ticket 501
3. Click button to view the detail of the specified ticket.
l Click button to copy the specified ticket. Rename the ticket in the Copy Ticket dialog
box.
l Click button to delete the specified ticket. Select multiple tickets and click Delete to
l Do not process the ticket: When processing a policy ticket, if an object with same name is
detected, system will terminate the ticket processing; when deploying a policy ticket, an
object with same name is detected, system will fail to deploy the ticket. Users can view such
tickets in "To be Processed" ticket list.
l Use the existing object with the same name: When processing or deploying a ticket, if an
object with same name is detected, system will use the existing object in managed devices and
will not create a new object in ticket. This option is configured by default.
Ticket 502
l Rename automatically: When processing or deploying a ticket, if an object with same name is
detected, system will add "- current timestamp" to rename it.
1. Select Ticket > Object Naming Configuration to enter Object Naming Configuration page.
Option Descriptions
Ticket 503
Option Descriptions
Naming Rule When select "Address Book" type, users need to con-
figure the specific information of the rule. Users can
select the variables "Ticket Name" and "Line", which are
dynamically created according to Ticket Name and
Remark of actual tickets; or manually type characters.
The name of source address book can be 95 characters at
most. A variable, letter, number and symbol are all 1 char-
acter, and a Chinese is 3 characters.
Option Descriptions
Ticket 504
Option Descriptions
Naming Rule When select "Address Book" type, users need to con-
figure the specific information of the rule. Users can
select the variables "Ticket Name" and "Line", which are
dynamically created according to Ticket Name and
Remark of actual tickets; or manually type characters.
The name of a destination address book can be 95 char-
acters at most. A variable, letter, number and symbol are
all 1 character, and a Chinese is 3 characters.
Option Descriptions
Service Book
Service Group
Ticket 505
Option Descriptions
Option Descriptions
3. Click Save.
Matching Mode
System supports users to configure matching rules to compose corresponding matching mode for
policy ticket. Matching mode meets users' different matching requirements for policy ticket and
managed devices, and facilitate the issuance of policy tickets.
Ticket 506
System predefines three matching modes, including Auto Matching, Manual Matching and Cus-
tomized Matching. Auto Matching and Manual Matching can not be deleted or edited. Users can
edit the rules of Customized Matching or create new matching modes.
System only allows one matching mode to be enabled at the same time. To enable the specified
matching mode, click to enable specified matching mode.
Auto Matching
System enables Auto Matching by default. Auto Matching contains one matching rule predefined
by system.
If users enable Auto Matching, according to the predefined rule of it, when system administrator
processes policy ticket, system will traverse all the managed devices. When the source address or
destination address configured in policy ticket matches the destination route network of the man-
aged device, system will pick out such devices, and the administrator can deploy corresponding
policy ticket to these devices.
Uses cannot edit or delete Auto Matching.
Manual Matching
If users enable Manual Matching, when processing a policy ticket, the system administrator needs
to manually add managed devices to be deployed for this ticket.
Users cannot edit or delete Manual Matching. And users cannot create matching rules for Manual
Matching.
Customized Matching
Customized Matching contains three matching rules, which can be deleted and edited. Users can
also add new matching rules for Customized Matching. If users enable Customized Matching,
when the system administrator processes a policy ticket, system will pick out the managed
devices according to the matching rules in Customized Matching and deploy this policy ticket to
such devices.
Ticket 507
l rule1: A rule of Net Object dimension. System will pick out the managed devices when both
source address and destination address of the policy ticket match User_Defined_Network1.
l rule2: A rule of Device dimension. System will traverse all the managed devices. System will
pick out the managed devices when the source address in the policy ticket matches User_
Defined_Network2 and Destination Route Network.
l rule3: A rule of Device dimension. System will traverse all the managed devices. System will
pick out the managed devices when the destination address in the policy ticket matches
Destination Route Network.
2. Click New in the left navigation bar. In the New Matching Mode dialog box, configure basic
information of the mode.
l Name: Specify the name of the matching mode. The range is 1 to 31 characters.
l Description: Enter the descriptions for the matching mode. The range is 0 to 255
characters.
Ticket 508
3. Click OK to save the settings.
1. In the left navigation bar of Matching Mode, select the user-defined matching mode that
needs to be configured. The main window displays the matching rule list of the mode.
2. Click New button above the matching rule list and select the type of the rule.
l A quintuple will be matched with devices: System will pick out the managed devices
that meet the conditions from all managed devices according to the configured match-
ing rules.
l A quintuple will be matched with networks: Users need to specify managed devices
associated with the rule first. System will use the five-tuple configured in policy
ticket to traverse all the networks in the rule. When the matching rule is met, system
will pick out the devices associated with the matching rule for corresponding policy
ticket.
Ticket 509
3. Click Next button to enter the New Matching Rule page.
Option Description
l Judgment-object: SrcIP/DstIP
Ticket 510
l Judgement-target: Destination Route Network/User-defined
Network
Option Description
Ticket 511
matching condition in the drop-down list, and click to add it to
l Judgment-object: SrcIP/DstIP
When multiple matching rules are configured in a matching mode, system automatically sorts all
the rules according to "rule of Net Object dimension > rule of Device dimension", an example is
shown below:
The matching mode "Mode1" contains four matching rules, "network1", "network2" ,"device1"
and "device2". The system administrator enables "Mode1". When the system administrator pro-
cesses the policy ticket "ticket1", system will executes the rules as follows:
Ticket 512
1. If system picks out managed devices for "ticket1" according to "network1", the matching-
process of "Mode1" ends. If system does not pick out a managed device for "ticket1" accord-
ing to "network1", then "network2" works.
2. If system does not pick out a managed device for "ticket1" according to both "network1"
and "network2", then rules of Device dimension will work.
3. System will execute all the rules of Device dimension to pick out corresponding devices for
"ticket1". Now, "Mode1" ends.
For user-defined rules in the matching rule list, you can perform other operations:
l Click to edit the specified rule. Rule Name can not be edited.
l Select the specified rule and drag to sort. The rule of Device dimension can not be adjusted
before the rule of Network dimension.
l Select the specified mode to enter its matching rule list. You can edit the rules in the list.
Network
System supports to configure network collections of different network segments according to
their needs, that is, User-defined Network. Both Destination Route Network and User-defined
Ticket 513
Network can be referenced when configuring matching rules to meet the matching requirements
for policy tickets and managed devices, and system can quickly select managed devices that match
different security policy tickets.
1. Select Ticket > Network > Destination Route Network. Users can view destination route
network list of managed devices in the page.
2. Enter the specified IP address in the text box of the toolbar, and click Search button to
quickly pick out the managed devices that contain the specified IP address in its destination
route network list.
3. Click the Device of an IP address in the list to jump to the destination route network page
of the managed device. In this page, users can operate as follows.
l Enter the specified IP/Mask in the text box of the toolbar, and click Add button to
add the address to the device's destination route network list.
l Click Delete button to remove the selected member. Members synchronized by man-
aged devices cannot be removed.
4. Click the managed device in the left navigation bar to view the destination route network
information of the device. Click the physical device, the destination route information of its
root vsys is displayed by default.
Ticket 514
User-defined Network
System supports users to create, edit, import and remove user-defined networks.
System has two default user-defined networks, "User_Defined_Network1" and "User_Defined_
Network2". Users can edit "User_Defined_Network1" and "User_Defined_Network2".
1. Select Ticket > Network > User-defined Network, click New button in the navigation bar.
The New Network dialog pops up.
l Description: Enter the descriptions for the network. The range is 0 to 256 characters.
l IP/Netmask: Specifies address of the network. Enter IP address and its netmask in
the text box, click add button to add the configured member to the list.
delete in batches.
2. Specify a user-defined network and click Edit button in the main window to enter the net-
Ticket 515
work configuration page.
3. Click Save.
2. Click Import button in the navigation bar to pop up the Import User-defined Network dia-
log box.
l Import Configuration File: Click Browse and select the EXCEL file for the user-
defined network.
l Download Template: Download and import the template of the user-defined network
file.
in batches.
Ticket 516
Monitor
The HSM monitor function gathers data of managed devices and display the statistics by bar chart,
pie chart, line char, table and so on. You can learn the network situation and resolve network prob-
lems through the statistics. HSM provides monitor data in multiple aspects, include
l Device monitor: Shows the statistics in the aspect of the managed device (traffic, attack
defense, anti-virus, IPS, CPU, memory). When problem happens in the network, you can fig-
ure out the problem device according to the result of the device rank, and under the help of
the drill-down function, you can investigate further in different factors.
l User monitor: Shows the statistics in the aspect of user/IP (traffic, attack defense, anti-virus,
IPS). When problem happens in the network, you can figure out the problem user/IP accord-
ing to result of user/IP rank, and under the help of the drill-down function, you can invest-
igate further in different factors.
l Application monitor: Shows the statistics in the aspect of application (application traffic).
Application monitor helps you know the applications in the network and learn the network
behavior of the managed people. Under the help of the drill-down function, you can get the
application related statistics from different factors in details.
l Network threat: Shows the statistics in the aspect of network threats (attack defense, anti-
virus, IPS). When network threats occurs in the network, you can figure out the threat accord-
ing to the result of the threat rank, and under the help of the drill-down function, you can
investigate further.
l Network behavior: Shows the statistics in the aspect of network behavior (URL hit and URL
category hit). Network behavior monitor helps you know the network behavior of the man-
aged people and hold the network access information.
Monitor 517
l you can continuously monitor a device in one aspect;
l you can access the favorite monitor page conveniently to get interested information;
Monitor 518
Device Monitor
The device monitor page shows kinds of statistics in the aspect of the managed device. The
device monitor statistics is organized in the main page (summary of device monitor), details page
(detailed statistics of each module), drill-down sub-page (statistics in a specified factor), and trend
page.
Main Page
Select Monitor > Device to enter the device monitor main page. The page shows the following
information with bar charts:
l Top 10 devices by Average Rate: The device average rate rank in a specified time period.
With the drill-down function, namely click a bar of a device, and select a factor from the pop-
up menu to see the related statistics. The supported factors are zone, interface, user/IP,
application, and traffic trend.
l Top 10 Devices by Threat: The threat count rank of devices in a specified time period, includ-
ing virus attack counts, intrusion counts and AD attack counts. With the drill-down function,
namely click a bar of a device, and select a factor from the pop-up menu to see the related stat-
Monitor 519
istics. The supported factors are interface, attacker, victim, and trend.
l Top 10 Devices by CPU Utilization: The CPU utilization rank of devices in a specified time
period. With the drill-down function, namely click a bar of a device, and select Trend to see
the CPU utilization trend statistics of the device.
l Top 10 Devices by Memory Utilization: The memory utilization rank of devices in a specified
time period. With the drill-down function, namely click a bar of a device, and select Trend to
Monitor 520
see the memory utilization trend statistics of the device.
1. Click Select Device (Group) from the up-left corner of the main page.
2. Select the Device or Device Group radio option, and then select the device or device group
from the box.
3. Click OK to save the changes and close the dialog. The monitor page only shows the stat-
istics of the selected devices.
HSM support pre-defined time period and customized time period. You can specify the time
period by configuring the options in the upper-right corner.
l : The drop-down list of pre-defined time period. The menu items are
described as below:
Monitor 521
l Latest 1 Day: Shows the statistics of the latest 1 day.
l : Customize the time period. Select this option, the Select Time dialog
appears. You can specify the time period according to your own requirements. The minimum
interval between the start time and the end time is 15 minutes, and at most the latest 1 year
statistics can be showed.
The devices and time period specified here will impact the details page, drill-down sub-page, and
trend page.
Details Page
In the main page, click Details of each chart to go to the corresponding details page.
The details page shows the detailed statistics with bar charts and tables. The bar charts are used to
show the device rank by different factors and you can switch factors by clicking the buttons in the
up-left corner.
Also the drill-down function and the specification of time period are supported; the tables are
used to display the detailed data, and you can get the interested data quickly by using the search
function.
What's more, the Add to MyMonitor function is provided in the details page. Click the Add to
MyMonitor button, the current chart and table information will be saved to MyMonitor. You can
get your interested monitor quickly in the MyMonitor module.
Monitor 522
Take the details page of device average rate as the example:
As shown in the screenshot above, the Top 10 drop-down list is used to determine the number of
bar shown in the bar chart; the Average Rate, Forwarding Rate, and New Sessions Count buttons
are used to switch among different factors; the time options in the upper-right corner are used to
specify the time period of the statistics; use the drill-down function on the bars to get more
detailed statistics in the specified factors.
As shown in the screenshot above, the detailed data of each device is displayed in the table. At
most, the data of top 200 devices can be displayed. By using the search function, you can get the
information you want quickly.
Notes: High, Middle, Low factors of the IPS details page refer to the severities of
IPS signatures which are high, middle and low.
Drill-down Sub-page
On the main page or the details page, click a bar and select a menu option, the pop-up page is the
drill-down sub-page. For example, in the device monitor main page, click the bar named M2105,
and select Interface from the pop-up menu, a new page showing interface traffic rank of M2105
appears. The data in the drill-down sub-page is organized in the same way as the details page
(excluding the trend page).
Monitor 523
Trend Page
In the bar chart, click a bar and select Traffic Trend/Trend, the trend page of the selected factor
appears. HSM uses line charts to show the developing trend in multiple factors.
Real-time Trend Monitor
To monitor a device in real-time, take the following steps:
1. In the main page or details page, click a bar and select Traffic Trend/Trend.
2. In the trend page, select Real-time from drop-down list in the upper-right corner.
Monitor 524
1. In the main page or details page, click a bar and select Traffic Trend/Trend.
3. The dialog showing the application distribution or the user/IP rank appears.
User Monitor
The user monitor page shows kinds of statistics in the aspect of users on the managed device. The
user monitor statistics is organized in the main page (summary of user monitor), details page
Monitor 525
(detailed statistics of each module), drill-down sub-page (statistics in a specified factor), and trend
page.
Main Page
Select Monitor > User to enter the user monitor main page. The user monitor main page shows
the following information with bar charts:
l Top 10 User Traffic: The user traffic rank in a specified time period. With the drill-down func-
tion, namely click a bar of a user, and select Traffic Trend from the pop-up menu to see the
corresponding statistics.
l Top 10 Users by Threat Count: The threat count rank of users (attacker) in a specified time
period, including virus attack counts, intrusion counts and AD attack counts.. With the drill-
down function, namely click a bar of a user, and select Victim or Trend from the pop-up
menu to see the corresponding statistics.
Monitor 526
To specify the devices whose statistics will be shown, take the following steps:
1. Click Select Device (Group) from the up-left corner of the main page.
2. Select the Device or Device Group radio option, and then select the device or device group
from the box.
3. Click OK to save the changes and close the dialog. The monitor page only shows the stat-
istics of the selected devices.
HSM support pre-defined time period and customized time period. You can specify the time
period by configuring the options in the upper-right corner.
l : The drop-down list of pre-defined time period. The menu items are
described as below:
l : Customize the time period. Select this option, the Select Time dialog
appears. You can specify the time period according to your own requirements. The minimum
interval between the start time and the end time is 15 minutes, and at most the latest 1 year
statistics can be showed.
The devices and time period specified here will impact the details page, drill-down sub-page, and
trend page.
Monitor 527
Details Page
In the main page, click Details of each chart to go to the corresponding details page.
The details page shows the detailed statistics with bar charts and tables. The bar charts are used to
show the user rank by different factors and you can switch factors by clicking the buttons in the
up-left corner.
Also the drill-down function and the specification of time period are supported; the tables are
used to display the detailed data, and you can get the interested data quickly by using the search
function.
What's more, the Add to MyMonitor function is provided in the details page. Click the Add to
MyMonitor button, the current chart and table information will be saved to MyMonitor. You can
get your interested monitor quickly in the MyMonitor module.
Take the details page of user traffic as the example:
As shown in the screenshot above, the Top 10 drop-down list is used to determine the number of
bar shown in the bar chart; the Average Rate, Sent, Received, Forwarding Rate, and New Sessions
Monitor 528
buttons are used to switch among different factors; the time options in the upper-right corner are
used to specify the time period of the statistics; use the drill-down function on the bars to get
more detailed statistics in the specified factors.
As shown in the screenshot above, the detailed data of each user is displayed in the table. At
most, the data of top 200 users can be displayed. By using the search function, you can get the
information you want quickly.
Drill-down Sub-page
On the main page or the details page, click a bar and select a menu option, the pop-up page is the
drill-down sub-page. The drill-down page shows the detailed statistics in a specified factor of the
user or the trending information of the user. For example, in the user monitor main page, click a
bar from the user traffic rank chart, and select Traffic Trend from the pop-up menu, a new page
showing traffic trend. The data in the drill-down sub-page is organized in the same way as the
details page (excluding the trend page).
Trend Page
In the bar chart, click a bar and select Traffic Trend/Trend, the trend page of the selected factor
appears. HSM uses line charts to show the developing trend in multiple factors.
Real-time Trend Monitor
To monitor a user on a device in real-time, take the following steps:
1. In the user monitor main page, click , and select a device on the Select
Monitor 529
2. In the main page or details page, click a bar and select Traffic Trend/Trend.
3. In the trend page, select Real-time from drop-down list in the upper-right corner.
Application Monitor
The application monitor page shows kinds of statistics in the aspect of applications on the man-
aged device. The user monitor statistics is organized in the main page (summary of application
monitor), details page (detailed statistics of each module), drill-down sub-page (statistics in a spe-
cified factor), and trend page.
Main Page
Select Monitor> Application to enter the application monitor main page. The application monitor
main page shows the following information with bar charts:
Monitor 530
l Top 10 Application Traffic: The application traffic rank in the specified time period. With the
drill-down function, namely click a bar of an application, and select a factor from the pop-up
menu to see the related statistics. The supported factors are device and Trend.
1. Click Select Device (Group) from the up-left corner of the main page.
2. Select the Device or Device Group radio option, and then select the device or device group
from the box.
3. Click OK to save the changes and close the dialog. The monitor page only shows the stat-
istics of the selected devices.
HSM support pre-defined time period and customized time period. You can specify the time
period by configuring the options in the upper-right corner.
l : The drop-down list of pre-defined time period. The menu items are
described as below:
Monitor 531
l Latest 1 Hour: Shows the statistics of the latest 1 hour.
l : Customize the time period. Select this option, the Select Time dialog
appears. You can specify the time period according to your own requirements. The minimum
interval between the start time and the end time is 15 minutes, and at most the latest 1 year
statistics can be showed.
The devices and time period specified here will impact the details page, drill-down sub-page, and
trend page.
Details Page
In the main page, click Details of each chart to go to the corresponding details page.
The details page shows the detailed statistics with bar charts and tables. The bar charts are used to
show the application rank by different factors and you can switch factors by clicking the buttons
in the up-left corner.
Also the drill-down function and the specification of time period are supported; the tables are
used to display the detailed data, and you can get the interested data quickly by using the search
function.
Monitor 532
What's more, the Add to MyMonitor function is provided in the details page. Click the Add to
MyMonitor button, the current chart and table information will be saved to MyMonitor. You can
get your interested monitor quickly in the MyMonitor module.
Take the details page of application traffic as the example:
As shown in the screenshot above, the Top 10 drop-down list is used to determine the number of
bar shown in the bar chart; the Average Rate, Forwarding Rate, and New Sessions buttons are
used to switch among different factors; the time options in the upper-right corner are used to spe-
cify the time period of the statistics; use the drill-down function on the bars to get more detailed
statistics in the specified factors.
As shown in the screenshot above, the detailed data of each application is displayed in the table.
At most, the data of top 200 applications can be displayed. By using the search function, you can
get the information you want quickly.
Drill-down Sub-page
On the main page or the details page, click a bar and select a menu option, the pop-up page is the
drill-down sub-page. The drill-down page shows the detailed statistics in a specified factor of the
application or the trending information of the application. For example, in the application monitor
Monitor 533
main page, click the HTTP bar from the application traffic rank chart, and select Device from the
pop-up menu, a new page showing device rank of the HTTP application appears. The data in the
drill-down sub-page is organized in the same way as the details page (excluding the trend page).
Trend Page
In the bar chart, click a bar and select Traffic Trend/Trend, the trend page of the selected factor
appears. HSM uses line charts to show the developing trend in multiple factors.
Real-time Trend Monitor (Method 1)
To monitor an application on a device in real-time, take the following steps:
1. In the user monitor main page, click and select a device on the Select
2. In the main page or details page, click a bar and select Traffic Trend/Trend.
3. In the trend page, select Real-time from drop-down list in the upper-right corner.
Monitor 534
Real-time Trend Monitor (Method 2)
To monitor an application on a device in real-time, take the following steps:
1. In the main page or details page, click a bar and select Device.
2. In the device rank bar chart, click a bar and select Trend from the pop-up menu.
3. In the trend page, select Real-time from drop-down list in the upper-right corner.
Main Page
Traditional
Select Monitor > Network Threat > Traditional to enter the network traditional threat monitor
main page. The network threat monitor main page shows the following information with bar
charts:
l Top 10 Attacks: The AD attack count rank in the specified time period. With the drill-down
function, namely click a bar of an attack, and select a factor from the pop-up menu to see the
related statistics. The supported factors are attacker, victim, device, and trend.
Monitor 535
l Top 10 Virus: The virus attack count in a specified time period. With the drill-down function,
namely click a bar of an virus, and select a factor from the pop-up menu to see the related stat-
istics. The supported factors are attack, victim, device, and trend.
l Top 10 Intrusions: The intrusion count in a specified time period. With the drill-down func-
tion, namely click a bar of an intrusion, and select a factor from the pop-up menu to see the
related statistics. The supported factors are attacker, victim, device, and trend.
Monitor 536
Intelligence
Select Monitor > Network Threat > Intelligence to enter the network Intelligence threat monitor
main page. Only NIPS and IDS devices support Intelligence threat monitor. The threat monitor
main page shows the following information:
l Threat Distribution: A pie chart shows the different threat types distributing in the specified
time period.
l Threat Deal Distribution: A doughnut chart shows threat deal distributing in the specified
time period. The inner ring displays proportion of blocking numbers and detecting numbers of
all threats, while the outer ring displays proportion of blocking numbers and detecting num-
bers of different types threats.
l Top 10 Threat: The threat count in a specified time period, including virus attack counts,
intrusion counts and AD attack counts.
Statistics Period
The managed devices and time period can be specified.
To specify the devices whose statistics will be showed, take the following steps:
1. Click Select Device (Group) from the up-left corner of the main page.
2. Select the Device or Device Group radio option, and then select the device or device group
from the box.
3. Click OK to save the changes and close the dialog. The monitor page only shows the stat-
istics of the selected devices.
HSM support pre-defined time period and customized time period. You can specify the time
period by configuring the options in the upper-right corner.
Monitor 537
l : The drop-down list of pre-defined time period. The menu items are
described as below:
l : Customize the time period. Select this option, the Select Time dialog
appears. You can specify the time period according to your own requirements. The minimum
interval between the start time and the end time is 15 minutes, and at most the latest 1 year
statistics can be showed.
The devices and time period specified here will impact the details page, drill-down sub-page, and
trend page.
Details Page
In the main page, click Details of each chart to go to the corresponding details page.
The details page shows the detailed statistics with bar charts and tables. The bar charts are used to
show the attack rank.
Monitor 538
Also the drill-down function and the specification of time period are supported; the tables are
used to display the detailed data, and you can get the interested data quickly by using the search
function.
What's more, the Add to MyMonitor function is provided in the details page. Click the Add to
MyMonitor button, the current chart and table information will be saved to MyMonitor. You can
get your interested monitor quickly in the MyMonitor module.
Take the details page of attacks ranking as the example:
As shown in the screenshot above, the Top 10 drop-down list is used to determine the number of
bar shown in the bar chart; the time options in the upper-right corner are used to specify the time
period of the statistics; use the drill-down function on the bars to get more detailed statistics in
the specified factors.
As shown in the screenshot above, the detailed data of each attack is displayed in the table. At
most, the data of top 200 attack can be displayed. By using the search function, you can get the
information you want quickly.
Notes: High, Middle, Low factors of the IPS details page refer to the severities of
IPS signatures which are high, middle and low.
Monitor 539
Drill-down Sub-page
On the main page or the details page, click a bar and select a menu option, the pop-up page is the
drill-down sub-page. The drill-down page shows the detailed statistics in a specified factor of the
attack or the trending information of the attack. For example, in the network threat monitor main
page, click a bar of an attack from the threat count rank chart, and select Device from the pop-up
menu, a new page showing device rank of the specified threat appears. The data in the drill-down
sub-page is organized in the same way as the details page (excluding the trend page).
Trend Page
In the bar chart, click a bar and select Trend, the trend page of the selected factor appears. HSM
uses line charts to show the developing trend in multiple factors.
Real-time Trend Monitor (Method 1)
To monitor an attack on a device in real-time, take the following steps:
1. In the network threat monitor main page, click and select a device on
2. In the main page or details page, click a bar and select Trend.
Monitor 540
3. In the trend page, select Real-time from drop-down list in the upper-right corner.
1. In the main page or details page, click a bar and select Device.
2. In the device rank bar chart, click a bar and select Trend from the pop-up menu.
3. In the trend page, select Real-time from drop-down list in the upper-right corner.
Monitor 541
1. In the main page or details page, click a bar and select Trend.
3. The dialog showing the attacker rank and victim rank appears.
Monitor 542
Main Page
Select Monitor > NBM to enter the network behavior monitor main page. The page shows the fol-
lowing information with bar charts:
l Top 10 URL Category Hit Count: The URL category hit count rank in a specified time period.
With the drill-down function, namely click a bar of an URL category, and select a factor from
the pop-up menu to see the related statistics. The supported factors are URL, user/IP, device,
and Trend.
l Top 10 URL Hit Count: The URL hit count rank in a specified time period. With the drill-
down function, namely click a bar of an URL, and select a factor from the pop-up menu to see
the related statistics. The supported factors are user/IP, device, and Trend.
The managed devices and time period can be specified. System supports to specify VSYS devices
if needed.
To specify the devices whose statistics will be showed, take the following steps:
Monitor 543
1. Click Select Device (Group) from the up-left corner of the main page.
2. Select the Device or Device Group radio option, and then select the device 、VSYS
devices or device group from the box.
3. Click OK to save the changes and close the dialog. The monitor page only shows the stat-
istics of the selected devices.
HSM support pre-defined time period and customized time period. You can specify the time
period by configuring the options in the upper-right corner.
l : The drop-down list of pre-defined time period. The menu items are
described as below:
l : Customize the time period. Select this option, the Select Time dialog
appears. You can specify the time period according to your own requirements. The minimum
interval between the start time and the end time is 15 minutes, and at most the latest 1 year
statistics can be showed.
The devices and time period specified here will impact the details page, drill-down sub-page, and
trend page.
Details Page
In the main page, click Details of each chart to go to the corresponding details page.
Monitor 544
The details page shows the detailed statistics with bar charts and tables. The bar charts are used to
show the URL category/URL hit count rank.
Also the drill-down function and the specification of time period are supported; the tables are
used to display the detailed data, and you can get the interested data quickly by using the search
function.
What's more, the Add to MyMonitor function is provided in the details page. Click the Add to
MyMonitor button, the current chart and table information will be saved to MyMonitor. You can
get your interested monitor quickly in the MyMonitor module.
Take the details page of URL category rank chart as the example:
As shown in the screenshot above, the Top 10 drop-down list is used to determine the number of
bar shown in the bar chart; the time options in the upper-right corner are used to specify the time
period of the statistics; use the drill-down function on the bars to get more detailed statistics in
the specified factors.
Monitor 545
As shown in the screenshot above, the detailed data of each URL category/URL is displayed in
the table. At most, the data of top 200 attack can be displayed. By using the search function, you
can get the information you want quickly.
Drill-down Sub-page
On the main page or the details page, click a bar and select a menu option, the pop-up page is the
drill-down sub-page. The drill-down page shows the detailed statistics in a specified factor of the
URL category/URL or the trending information of the URL category/URL. For example, in the
network behavior monitor main page, click a bar of a URL category from the URL category hit
count rank chart, and select URL from the pop-up menu, a new page showing URL hit count rank
of the specified URL category appears. The data in the drill-down sub-page is organized in the
same way as the details page (excluding the trend page).
Trend Page
In the bar chart, click a bar and select Trend, the trend page of the selected factor appears. HSM
uses line charts to show the developing trend in multiple factors.
Real-time Trend Monitor (Method 1)
To monitor an URL category/URL on a device in real-time, take the following steps:
1. In the network behavior monitor main page, click and select a device on
Monitor 546
2. In the main page or details page, click a bar and select Trend.
3. In the trend page, select Real-time from drop-down list in the upper-right corner.
1. In the main page or details page, click a bar and select Device.
2. In the device rank bar chart, click a bar and select Trend from the pop-up menu.
3. In the trend page, select Real-time from drop-down list in the upper-right corner.
Monitor 547
1. In the main page or details page, click a bar and select Trend.
MyMonitor
The MyMonitor function enables you to view the important monitor statistics easily and con-
veniently. The charts added to MyMonitor are organized by monitor groups (there is a default
monitor group named Default Group), all the charts in one group are displayed in one page. One
monitor group can contain 10 charts at most, and the maximum monitor group number is 10. The
default group (Default Group) cannot be deleted.
Monitor 548
Adding to MyMonitor
To add a monitor chart to MyMonitor, take the following steps:
1. Most of the monitor pages have the Add to MyMonitor button in the
upper-right corner. Click this button, and the Add To MyMonitor dialog appears.
2. Select a monitor group from the MyMonitor Group drop-down list. The chart will be added
to the group specified here.
3. Type a name for the added chart in the MyMonitor Name text box.
1. Log in to HSM, select Monitor > MyMonitor to expand the monitor group, and click one of
the monitor groups.
2. In the main window, click the Monitor group config button and the dialog appears.
Monitor 549
3. Type a name for the new monitor group in the Name text box.
4. Click Add Group to save the changes and close the dialog.
2. Click the Monitor group config button and the dialog appears.
3. Select the group and click the Delete button, and the Confirm dialog pops up.
4. Click OK.
1. Log in to HSM, select Monitor > MyMonitor to expand the monitor group.
2. Select a monitor group and the charts added to the selected monitor group are displayed in
the main window.
Monitor 550
VPN
HSM system not only supports to show VPN statistics on the managed devices through VPN
Monitor page, but also supports to quickly deliver VPN configurations to the devices that need to
join the network through VPN Network configuration.
VPN Monitor
The VPN statistics is organized in the Overview(VPN traffic ranking and VPN traffic trend) page,
Tunnel page,Tunnel Link page, WAN Link page, Topology page and Map page.
Overview
Click VPN > VPN > Overview to enter the device VPN traffic statistics page. This page shows
the VPN traffic statistics information of all managed devices, including total VPN traffic ranking
(bar chart) and total traffic trend (line chart).
Device Rank by Total VPN Traffic
The system uses the bar chart to show the device ranking by total VPN traffic. You can click the
button to view the enlarged bar chart.
VPN 551
You can select devices to be shown in the chart, specify the statistical time period, specify Top X
shown in the chart, and view the tunnel traffic trend/rank of a single device.
To specify the devices whose statistics will be shown, take the following steps:
1. Click Add Legend Item under the line chart, a dialog box with all managed devices appears.
2. Select the devices you want from the dialog box. Use the search function to find the desired
device from the upper-right corner if necessary.
3. Click anywhere outside the dialog box to close it. The selected devices will be shown on
the line chart.
HSM support pre-defined time period. You can specify the time period by configuring the options
in the upper-right corner.
: The drop-down list of pre-defined time period. The menu items are described
as below:
VPN 552
l Latest 5 Minutes: Shows the statistics of the latest 5 minutes.
l Custom: Show statistical information of a customized number of devices. You can specify the
number by selecting devices from the Add Legend Item dialog.
To view the tunnel traffic trend/ranking page, select a bar and click VPN Traffic Rank.
VPN 553
You can select tunnels to be shown in the chart, specify the statistical time period, and specify
Top X shown in the chart.
To select tunnels, take the following steps:
1. Click Add Legend Item under the line chart, a dialog box with all tunnels appears.
2. Select the tunnels you want from the dialog box. Use the search function to find the desired
tunnel from the upper-right corner if necessary
3. Click anywhere outside the dialog box to close it. The selected tunnels will be shown on the
line chart.
HSM support pre-defined time period. You can specify the time period by configuring the options
in the upper-right corner.
: The drop-down list of pre-defined time period. The menu items are described
as below:
VPN 554
l Custom: Show statistical information of a customized number of devices. You can specify the
number by selecting devices from the Add Legend Item dialog.
You can select devices to be shown in the chart, specify the statistical time period, and view the
tunnel traffic trend/rank.
To specify the devices whose statistics will be shown, take the following steps:
1. Click Add Legend Item under the line chart, a dialog box with all managed devices appears.
2. Select the devices you want from the dialog box. Use the search function to find the desired
device from the upper-right corner if necessary.
3. Click anywhere outside the dialog box to close it. The selected devices will be shown on
the line chart.
VPN 555
HSM support pre-defined time period. You can specify the time period by configuring the options
in the upper-right corner.
: The drop-down list of pre-defined time period. The menu items are described
as below:
To view the tunnel traffic trend/rank chart, select a value point on the line chart, click VPN
Traffic Trend.
You can select tunnels to be shown in the chart, and specify the statistical time period.
VPN 556
To select tunnels, take the following steps:
1. Click Add Legend Item under the line chart, a dialog box with all tunnels appears.
2. Select the tunnels you want from the dialog box. Use the search function to find the desired
tunnel from the upper-right corner if necessary
3. Click anywhere outside the dialog box to close it. The selected tunnels will be shown on the
line chart.
HSM support pre-defined time period. You can specify the time period by configuring the options
in the upper-right corner.
: The drop-down list of pre-defined time period. The menu items are described
as below:
Tunnel
Click VPN > VPN > Tunnel to enter the tunnel statistics page. This page shows a table with
detailed tunnel information. Options of the table are described as below:
Option Description
VPN Name Shows the tunnel name. Click the tunnel name, the system
enters the traffic trend/traffic rank page of the tunnel.
VPN 557
Option Description
comment, the VPN Comment dialog will appear. You can cus-
tomize a comment or edit the configured comment for the tun-
nel. Only when the managed device is deleted from HSM,
HSM will clear the configured comment.
Notes:Users can only view VPN comments on HSM and
VPN comments will not be deployed to managed devices.
l : Connected.
l : Disconnected.
Received Rate Shows the received traffic rate of the tunnel interface.
(bps)
Sent Rate Shows the sent traffic rate of the tunnel interface.
(bps)
Keep Online/ If the tunnel is connected, shows the duration of the tunnel
Offline since it is connected. If the tunnel is disconnected, shows the
duration of the tunnel since it is disconnected.
Re-connecting Shows the re-connecting times of the tunnel. Click the num-
Times ber in the cell, the Reconnetion Time dialog appears. You can
check the detailed re-connecting information of the tunnel in a
specified time period.
VPN Type Shows the type of the tunnel. Only IPSec VPN is supported
in the version.
VPN 558
Option Description
Device Name Shows the device name the tunnel belongs to. Click the
device name, the system enters the VPN traffic trend/VPN
traffic rank page.
Latency Shows the time consumed between sending the packet and
receiving the response.
The search function is supported for you to find the desired information. The search conditions
are listed above the tunnel table, and you can find information according to you own require-
ments.
l Search: Search for tunnels by VPN Name, VPN comment, Device Name, Peer IP, and Tun-
nel Status.
Option Description
Tunnel Interface Shows the tunnel interface name (IKE name). Click the tun-
(tunnel name) nel interface name to enter the tunnel details page. By
VPN 559
Option Description
l : Connected.
l : Disconnected.
VPN 560
Option Description
Traffic (bps)
Latency (ms) Shows the time consumed between sending the packet and
receiving the response via the tunnel.
Jitter (ms) Shows the jitter between packets sent via the tunnel link.
Packet Loss Rate Shows the packet loss rate of the tunnel.
(%)
The search function is supported for you to find the desired information. The search conditions
are listed above the tunnel link table, and you can find information according to you own require-
ments.。
l Search: Search for tunnel links by Tunnel Name, srcDevice, and Tunnel Status.
Option Description
Device Name Shows the name of the managed device. Click the device name
to enter the WAN link details page. By default, system dis-
plays trend charts of the link details within the last 5 minutes,
including the Delay Trend, Jitter Trend, Loss Rate Trend,
Upstream Traffic Trend, Downstream Traffic Trend, and Total
VPN 561
Option Description
l : Connected.
l : Disconnected.
VPN 562
Option Description
Latency (ms) Shows the time consumed between sending the packet and
receiving the response via the tunnel.
Jitter (ms) Shows the jitter between packets sent via the tunnel link.
The search function is supported for you to find the desired information. The search conditions
are listed above the WAN link table, and you can find information according to you own require-
ments.
Topology
Click VPN > VPN > Topology to view the VPN of monitored devices. At present, only IPSec
VPN can be monitored in system.
VPN 563
The line between devices means the tunnel has been build between devices. You can check
whether there's alarm via the tunnel color. When the tunnel is gray, it means the tunnel is normal.
Hover the mouse over the tunnel to view the loss rate and latency of bidirectional tunnels; when
the tunnel is orange, it means there're alarms of the tunnel. Hover the mouse over the tunnel to
view the loss rate and latency of bidirectional tunnels and the alarm rule.
Hover the mouse over a device, and you can check the device name, and utilization of CPU and
memory. The "Unknown Device" means the device hasn't registered in HSM. When there's a
cloud icon on the topology, it means that some devices are hided. Click the cloud icon
to enlarged the topology and view the hided devices.
You can execute the topology as follows:
l Add to Center Nodes: When there're a large of tunnels on the topology, you can specify one
or more devices as the center node of the VPN topology. Then all devices will be distributed
according to the center nodes and the devices which are specified as the center nodes will be
in the same level of the VPN. The device which has the most tunnels is the default center
node. Right-click the device, select Add to Center Nodes, and the device will be set as the
VPN 564
center node. You can repeat the above operations to add more devices as center nodes. The
center node can be deleted in the center node list and at least one center node should be left.
l Hide Node: You can hide the device in the topology. Right-click the device, select Hide
Node, and unselect the devices that need to hide in the pop-up dialog. To show the device
again, right-click on the blank space and select the device that need to show in the pop-up dia-
log. All devices are selected by default.
l Auto Layout: Select Auto Layout > Circle/Tree(vertical)/Tree(horizontal), and the device
and tunnels will distributed in the order. You can also click to back the topology to
the last layout. When you log in again, the topology shows the latest distributed result.
l Back to Center: Click Back to Center or the icon to make the topology display in the cen-
l Batch Mode: Click Batch Mode to select batch devices and move.
l Search: Type the device name into the search box, and the searched device will be highlighted
and displayed in the center of the topology.
l Alarm Board: Click Alarm Board to view the monitored object, alarm reason and handle
status:
l Reason: Display the alarm reason. Double click the tunnel to locate the tunnel in the
topology.
l Handle: Click the icon to view the detailed alarm reason and handle status. Write
the handle methods and result in Comment, and the alarm will be handled. The handled
alarm will be removed from the Alarm Board.
VPN 565
l Scale up topology: When there's cloud icon in the topology, it means there're devices being
hided. Click the“+”button, or double-click the cloud icon, or scroll the mouse to scale up
the topology.
l Full Screen: Click Full Screen and display the topology in the full screen. Click Exit to exit
the full screen mode.
Map
Log into HSM, click VPN > VPN > Map to display the VPN link information of the managed
device with location.
The shade of the background color indicates the number of devices in this province. The more
devices you have, the darker the color. When a VPN link is disconnected in the province, the
color of the provincial node icon is displayed in red.
l Click "+" to enlarge the map, click "-" to zoom out the map, click to restore the original
state.
l Click to view map in full screen mode, click to exit full screen mode.
l The list on the right shows the device status of each province and municipality, including the
number of devices and the number of offline devices. Click the provincial node to view the
detailed information of the device, including the device name, status, software version,
address, and device platform. Enter keywords in the search box to search for a specified city
or district. Click icon to return to the previous map.
l Click on a provincial area or icon in the map or click on the geographic location in the right
list to drill down to the map of the province and check the distribution of device in the
province. The list on the right shows device information for cities in the province, including
the number of devices and the number of offline devices. Click the city-level node to view
VPN 566
the detailed information of the device, including the device name, status, software version,
address, and device platform. Enter keywords in the search box and search for a specific
device by device name or address. Click icon to return to the previous map.
l Click the line to view the link information between the two nodes, including the link name
and connection status. Click the "+" to view detailed information of the specified link. When
the link is disconnected, click the icon in the Edit column to delete the specified link.
Lines
The connection between VPN links is represented by the connections between provincial nodes
or municipal nodes. The color of connections lines have their own meaning:
l Bold: If you click the line, it will become bold, which means this line is selected. The list on
the right side of the page displays information about all links between the current nodes.
VPN Network
HSM system supports for VPN network configuration, which helps users quickly establish a VPN
network and deliver configurations during the ZTP deployment. Currently, the system only sup-
ports for star network configuration.
Star Network
The star network connects many devices of point-to-point through the central device (HUB),
which is easy to maintain and manage. The system supports single HUB mode and dual HUB
mode.
To creating a star network, take the following steps:
VPN 567
1. Select VPN > VPN Network > Star Network.
Option Description
Option Description
HUB Mode Specify the HUB mode, select one or two HUB devices
as needed.
VPN 568
Option Description
HUB Configuratin
HUB Device Select the HUB device in the drop-down list. Note:
HUB WAN Specifies the WAN interface mode of the HUB device as
Mode needed, including single WAN interface or dual WAN
interface mode.
HUB WAN Specifies the WAN interface of the HUB device, the car-
rier correspondence, and the tunnel address pool.
VPN 569
Option Description
More Config
5. Click OK.
l Edit: Select the star network needed to be edited, click Edit to modify the configuration in
the dialog. Note: When a branch device is added to the network, only the name and descrip-
tion of the network can be modified.
l Delete: Select the star network needed to be deleted, click Deleteto delete the configuration
in the dialog. Note: When a branch device is added to the network, the network can not be
deleted.
l Select a star network entry from the network list, and view the details under the list, including
the name and status of the HUB device and spoken device. In the HUB device area, click
detail to view the information of WAN interface.
Mesh Network
Mesh network connects headquarters device and HUB device to provide automatic VPN network
between headquarters and HUB device.
VPN 570
Creating a Mesh Network
VPN 571
3. In the Basic Configuration tab, configuration the corresponding options.
Option Description
More Config
4. Click OK.
l Edit: Select the mesh network needed to be edited, click Edit to modify the configuration in
the dialog. Note: The name of the network cannot be edited. When there are devices in the
network, the configuration in the more config cannot be edited.
l Delete: Select the mesh network needed to be deleted, click Deleteto delete the con-
figuration in the dialog. Note: When There is no device in the network, the network can be
deleted.
l Deploy: Select the mesh network needed to deploy the configuration, click Deploy to deploy
the network configuration and generate the corresponding deploy task. Click to view the
VPN 572
Adding/Deleting a Network Device
You can add/delete devices for mesh networking and non-interconnected VPN connection
devices for specified devices. In the list of mesh network, select the entry to be edited and view
the detail of the network under the list.
o Click Edit to add/delete devices for mesh networking and non-interconnected VPN con-
nection devices for specified devices.
2. Click Add Device in the All Devices area and the Device Network Configuration dialog
pops up.
3. Select the devices needed to add to the network in the Device drop-down list.
4. Select the mode fot WAN port, single WAN interface or dual WAN interface mode.
VPN 573
5. Specify the WAN interface of the device, including physical interface, public mapping IP
and Operator.
6. Click OK.
2. Select the device needed to delete in the All Devices area, click Delete Device.
To add non-interconnected VPN connection device for the specified device, take the following
steps:
2. Select the device needed to add non-interconnected VPN connection device in the All
Devices area, click Add in the non-interconnected VPN connection area and Add dialog
pops up.
VPN 574
3. Select the devices and click to add them to the right pane.
4. Click OK.
To delete the non-interconnected VPN connection device for the specified device, take the fol-
lowing steps:
2. Select the device needed to be deleted in the non-interconnected VPN connection area,
click Delete.
Network Topology
In the network detail area, click Topology View to view the topology of the mesh network.
l Hover over your mouse on a device, "+" appears, drag and place the line on the unconnected
device and add the interconnection relationship between the specified devices.
l Select a line, right-click and select Delete to delete the connection relationship between the
specified devices.
l Click Edit and then click Add Device to add the network device in the Device Network Con-
figuration dialog. Right click the device, select Delete to delete the specified device.
l Click Full Screen to view the network topology in full screen, and click Exit Fullscreen to
exit full screen mode.
Address Pool
To edit the address pool, take the following steps:
VPN 575
1. Click VPN > VPN Network > Star Network or VPN > VPN Network > Mesh Network.
4. In the Address Pool Configuration dialog, edit the start IP, end IP, reserved start IP and
reserved end IP.
5. Click OK.
VPN 576
Introduction to the Alarm Function
HSM is capable of 24-hour monitoring network performance, and send an alarm notification to
notice users there is abnormity. You can choose how to proceed according to alarm contents after
receiving alarms.
For more information about the alarm function, see the followings:
l Alarm
l Alarm Rule
l Alarm Analysis
2. Select Alarm Search from the alarm navigation pane, the alarm window will show all the
alarm information.
Searching
Description
Condition
device name.
Alarm Rule Search the alarm information that matched the specified
alarm rules.
Read Time Search the alarm information that matched the specified
read time of alarm rules.
4. Click Search, the alarm window will show all the alarm information that matched the spe-
cified rules.
Reading alarm information includes two actions: reading the message, and adding a comment.
You can operate one of the followings to read alarm information:
l Read all the alarm information, select Read All and the Add Comment dialog appears. Type
comment information and then click OK.
Alarm Analysis
HSM provides the alarm analysis function, which can show you device statistics information or
time trend analysis.
The configurations of this page include:
l Device Analysis
l Trend Analysis
Device Analysis
1. Click Alarm from the level-1 navigation pane to enter the alarm page.
3. Specify searching conditions to view the number of alarms that matched the specified con-
ditions.
Searching
Description
Condition
Alarm Rule Search the alarm information that matched the specified
alarm rules.
5. In the pie chart on the right side, click different colors of alarm severity, the table below
will show you alarm information for this severity.
l Click the Status column in the table, and the Add Comment dialog appears. Type
alarm reason and comment in the text box and then click OK.
l Batch process multiple alarm information, multi-check the check box before alarm
information, and then click Read Selected button on the top of the table, the Add
Comment dialog appears. Type alarm reason and comment in the text box and then
click OK.
The alarming time trend line chart shows the trend of alarm times for one period.
To view the alarm trend analysis, take the following steps:
2. Select Alarm Analysis > Trend Analysis from the alarm navigation pane, the alarm trend ana-
lysis page appears.
3. Specify searching conditions to view the alarm trend analysis that matched the specified con-
dition.
Searching
Description
Condition
device name.
Alarm Rule Search the alarm information that matched the spe-
cified alarm rules.
Alarming Time Search the alarm information that matched the spe-
cified alarming time.
l Click the Status column in the table, and the Add Comment dialog appears. Type
alarm reason and comment in the text box and then click Confirm.
l Batch process multiple alarm information, multi-check the check box before alarm
information, and then click Read Selected button on the top of the table, the Add
Comment dialog appears. Type alarm reason and comment in the text box and then
click Confirm.
HSM provides multiple predefined alarm rules. Every predefined rule can be modified and it will
take effect after modifications.
To view the predefined alarm rule, take the following steps:
2. Select Alarm Rule > Predefined from the alarm navigation pane.
3. Select the type of the alarm rule, and the alarm window will show you the predefined alarm
rule list.
l Only alarm.
l Besides alarm, HSM can send an alarm email or message to the specified recipient.
(Select the check box before Send via Email or Send via SMS, and click New, con-
figure the recipient name, Email, Mobile Phone and Comment in the Send via Email
dialog.)
1. Select Alarm Rule > User-defined from the alarm navigation pane.
Rule Name: Show the alarm rule name. Predefined rule name cannot be modified.
Description: Type the descriptions of the rule.
Trigger: Specify the trigger condition that alarm occurs. When monitoring that there is
such an event happened on the selected device, HSM will generate an alarm message.
Only some rules need the trigger condition.
Device: Select the device which applied the alarm rule from the drop-down list. Rules of
intelligent threat can only be applied to NIPS devices.
Action: HSM can take the following actions when alarm occurs:
l Besides alarm, HSM can send an alarm email or message to the specified recipient.
(Select the checkbox before Send via Email or Send via SMS, and click New, con-
figure the recipient name, Email, Mobile phone and Comment in the Send via Email
dialog.)
To edit an alarm rule that has already created, take the following steps:
1. In the alarm window of the Alarm Rule page, select the rule you want to modify.
To manage the mail or message recipients who receive the HSM alarm, take the following steps:
1. In the alarm window of the Alarm Rule page, Click Send via Email.
2. In the Send via Email dialog, configure as one of the methods below:
l Click New, and then specify the recipient name, Email, Mobile phone and comment in
the text box.
l Select the check box before the recipient who you want to delete, and then click
Delete. (If a recipient has been referenced by an alarm rule, the recipient cannot be
deleted.)
Only the enabled alarm rule can be effective. The rule which is disabled cannot take effect.
To enable/disable an alarm rule, take the following steps:
1. In the alarm window of the Alarm Rule page, select the checkbox before the rule you want
to enable/disable.
1. Select Alarm Rule > All Rules > User-defined from the alarm navigation pane.
Notes:
l The alarm rule will be stored in the Recycle Bin after being deleted. You can
click Restore in the Recycle Bin page to restore the rule to its origin place or
click Delete in the Recycle Bin page to permanently delete the rule.
l If the alarm rules are permanently deleted, the alarm information that matched
the rule are all deleted at the same time.
All the deleted rules are stored in the recycle bin. To delete rules permanently, take the following
steps:
1. Select Alarm Rule > Recycle Bin from the alarm navigation pane.
3. Click OK.
Notes:
If the alarm rules are permanently deleted, the alarm information that matched the
rule are all deleted at the same time.
l Traffic: Traffic information for the specified devices, zones, interfaces, applications, users or
time range.
l Network threat: Network threat information about AV, IPS and attack defense.
l Network behavior: Network behavior information about Internet surfing and IM.
l System: CPU, memory and session information for the managed devices.
Note that the above items. may not be available on all devices. Please check your system's actual
page to see if your device delivers this items.
For more information about report, see the following chapters:
l Report File
l Report Template
l Server
1. Select Report from the Level-1 navigation pane to enter the report page.
3. By default the report files are sorted by the time of creation. Click the column name to sort
by the file name of the corresponding template, time of creation and author name of the cor-
responding template; click the column name again to sort the report files in the reversed
order.
4. To search for a report file by keywords, type a keyword into the searching box in the tool-
bar, and press Enter. All the report files that contain the keyword will be listed in the report
window.
To view a deleted report file, click Report Summary > Deleted Files in the report navigation
pane, and repeat Step 3 to Step 6 above.
Notes: By default the report categories are not expanded. Each category may contain
several report files. Only 100 report files can be listed in one page, so possibly there
are more categories in other pages. To view the categories that are not listed in the
current page, click the Next button on the lower-right.
HSM can generate report files in PDF or HTML format. The file format is specified in the Output
of the file's template.
To download a report file in the system, take the following steps:
2. In the report navigation pane, click Report Summary > File Collection to list all the report
files in the system in the report window. By default the report files are sorted by the time of
creation.
l To download a report file, click the icon under the File Type column ( indicates
HTML format, indicates PDF format, and indicates WORD format), and down-
l To batch download multiple report files, select the checkboxes for the files, click
Download in the toolbar, and download the compressed file package to your local
disk as prompted. The file format in the package is specified in the Output of the
file's template.
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Summary > File Collection to list all the report
files in the system in the report window. By default the report files are sorted by the time of
creation.
3. Select the checkbox for the report file (or checkboxes for multiple report files) to be
deleted, and click Delete in the bool bar.
Notes: The deleted files are moved to Report Summary > Deleted Files.
You can restore a deleted report file if the file is not cleared. To restore a deleted report file, take
the following steps:
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Summary > Deleted Files to list all the deleted
report files in the report window.
3. Select the checkbox for the report file (or checkboxes for multiple report files) to be
restored, and click Restore in the bool bar.
The deleted files are moved to Report File > Deleted Files, and can be restored anytime. For
more details, see Restoring a Report File.
To delete a deleted report file permanently, take the following steps:
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Summary > Deleted Files to list all the deleted
report files in the report window.
3. Select the checkbox for the report file (or checkboxes for multiple report files) to be
cleared, and click Delete in the toolbar.
You can also click Clear in the toolbar and then click OK in the OK dialog to delete all the
deleted files permanently.
HSM provides a template wizard to help you create a user-defined template. You can create a
report template step by step as prompted by the template.
To start the template wizard, take the following steps:
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Template > Existed to list all the user-defined
templates in the report window.
You can also edit a predefined template to create a user-defined template. In the report navigation
pane, click the predefined template to be edited to start the template wizard.
To create a report template, you need to complete eight steps in different wizard tabs. Completing
one step, click Next to go to the next step. Options and notices in each step are shown below:
Basic
This tab contains the basic information of the report template, and will be shown in the first page
of the report file. Configure options as below:
Device
Data Time
Report item, the key component of a report, defines the statistic contents. HSM contains nearly
100 built-in report items, covering analysis data in traffic, network, network behaviors, VPN, sys-
tem, etc. A report template can contain multiple report items.
To add a report item to the template, take the following steps:
1. Expand a report item category node in the left All box, select a category to list all the items
in the category in the Available box.
2. Select an item and click Add, or click Add All. All the selected report item categories will
be listed in the Selected box. To delete an item, select the item (or press Ctrl and left-click
to select multiple items) and click Delete, or click Delete All to delete all the items.
Notes: You need to select at least one report item, otherwise you can neither go to
the next step nor save the template.
Item Options
Configure the following detailed options for each report item under the tab:
Basic: Shows the title and description of the report item (editable). Select the checkbox for Show
the above chart to show the description in the upper of the chart.
Filter: The filter options vary from report items. By default the report item counts all the objects
of the selected devices. To edit a filter parameter, see filter parameter description below.
Parameter Description
Application By default the system counts all the application traffic of the
selected devices (all the checkboxes are not selected).
To only count traffic of the specified application, select Applic-
ation under Filter; under the Not Include tab, select the applic-
ations that will not be included in the traffic statistics. If an
Direction By default the system counts both the sent and received traffic
of the selected devices.
To only count the sent traffic, select the checkbox for Sent
Traffic, and clear the checkbox for Received Traffic; to only
count the received traffic, select the checkbox for Received
Traffic, and clear the checkbox for Sent Traffic.
Zone By default the system counts all the zone traffic of the selec-
ted devices (all the checkboxes are not selected).
To only count traffic of the specified zone, select Zone under
Filter; under the Not Include tab, select the zones that will
not be included in the traffic statistics. If a zone is selected
under the Include and Not Include tabs simultaneously, the
traffic of the zone will not be included in traffic statistics.
Interface By default the system counts all the interface traffic of the
selected devices.
To only count traffic of the specified interface, select Inter-
face under Filter; under the Not Include tab, select the inter-
faces that will not be included in the traffic statistics. If an
interface is selected under the Include and Not Include tabs
simultaneously, the traffic of the interface will not be included
in traffic statistics.
the attack name into the text box and click Add; under the
Not Include tab, type the attack name that will not be
included in the attack count into the text box and click Add.
Level Specify the severity of attacks which can be High and above,
Middle and above and Low and above.
Time Specify the time range of statistics. By default the time range is
the same as the schedule defined in the report template.
To modify the time range of the report item, clear the check-
box for Inherit from Template, and select a time range within
the time range specified by the report template.
Chart: Specify the number of ranking items in the tables and charts of reports. The system can
show maximum Top 10 ranking items.
Schedule
Report schedule specifies the time range the corresponding report template will take effect. Dur-
ing the time range specified by the report schedule, system will generate report files continuous.
A report template can contain multiple report schedules.
To add a report schedule to the report template, take the following steps:
Generation Cycle: Specify the generation cycle of report files which can be daily, weekly,
monthly, quarterly or one-time.
Effective: Specify the start time and end time of the schedule. Select No End to make the
template take effect for ever.
Delete Schedule after End Date: Select the checkbox to delete the schedule after end date.
Generated at: Specify the date and time the report file is generated.
You need to select at least one schedule, otherwise you will neither be able to go to the next step
nor save the template.
Output
Output specifies the format of report files and the destination the report files will be sent to. Con-
figure the options as below:
1. Click the Manage button. In the Email Configuration dialog, click Add .
2. In the Add dialog, enter the name, email and comments of the recipient and click OK.
4. In the Recipient dialog, select the recipient from the list, click OK and the added recipients
will be displayed under the text box.
Send via Email Text: Select the check box to edit the email title and text. If the check box is
unselected, system will send the default title and text.
l Title: Enter the email title, ranging from 1 to 120 characters. The item is required if the func-
tion is enabled.
l Text: Enter the mail text, ranging from 1 to 500 characters. The item is optional. If it's not spe-
cified, system will send the default text.
Send via FTP: Select the checkbox to send the report files to an FTP server.
Server Name/IP:Type the server name or IP address.
Username: Type the username to log into the FTP server.
Password: Type the password to log into the FTP server.
Anonymous: Select the checkbox to log into the FTP server anonymously (only applicable to the
FTP server that allows anonymous login).
Path: Type the filepath for the report files.
Test: Click the button to test if the FTP server is available.
Sample
Sample is used to demonstrate the report file based on the template. To view a sample, take the
2. When the system prompts "Generation succeeded", click View Sample to view the report
file.
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Template > Existed to list all the user-defined
templates in the report window.
3. Double-click the report template to be edited, and edit options under each tab.
Notes: To preview the report file based on the configured template, click Generate
Now on the upper-left to generate a report file immediately. Click Report File >
File Collection and double-click the report file with the name specified in the tem-
plate to open the report file in a new window of your web browser.
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Template > Existed to list all the user-defined
templates in the report window.
3. Select the checkbox for the template to be deleted, and click Delete.
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Template > Deleted to list all the deleted tem-
plates in the report window.
3. Select the checkbox for the template to be restored, and click Restore.
Notes: To also restore the report files deleted along with the template, see the steps
described in Restoring a Report File.
The deleted report templates are moved to Report Template > Deleted. To delete a user-defined
report template permanently, take the following steps:
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Template > Deleted to list all the deleted tem-
plates in the report window.
3. Select the checkbox for the template to be deleted permanently, and click Delete.
You can also click Clear in the toolbar and then click OK in the OK dialog to delete all the
deleted report templates permanently.
For more details about how to add a report schedule when creating a report template, see Sched-
ule in Creating a User-defined Template.
To add a report schedule to an existing report template, click Report Template > Existed in the
report navigation pane, and double-click the report template. Create a report schedule under the
Schedule tab.
You can view the running log of a report schedule and report template, including the running log
of the report schedule and details, running log and modification history of the report template.
To view the running log of a report template and report schedule, take the following steps:
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Schedule to list all the report schedules by cat-
egories in the report window.
Report schedule is configured under the Schedule tab of a report template. If a report schedule is
deleted, the schedule in the corresponding report template will be deleted as well.
To delete a report schedule, take the following steps:
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Schedule to list all the report schedules by cat-
egories in the report window.
3. Expand a report template and select the checkbox for the report schedule to be deleted.
Click Delete.
When editing a report template, you can also click Delete under the Schedule tab to delete the
report schedule.
1. Select Report from the Level-1 navigation pane to enter the report page.
2. In the report navigation pane, click Report Schedule to list all the report schedules by cat-
egories in the report window.
3. Expand a report template and select the checkbox for the report schedule to be enabled/dis-
When editing a report template, you can also click Enable/Disable under the Schedule tab to
enable/disable the report schedule.
Report Server
NIPS devices support Report Server function. By specifying the name and the IP address of the
intranet servers, the report with the security risk summary and security risk detail selected will dis-
play the reports of these servers.
Configuring Servers
To configure the servers, take the following steps:
Option Description
3. Click OK.
In the generated reports, you can search the name of servers you specified to view the cor-
responding information.
Introduction to Log
This chapter contains log and old version log. The upgrading descriptions of log and old version
log are listed in the table below.
Before version After upgrading to version 2.5R2 or above, you can manage the
2.5R2, and collected logs in Old Version Log. For the new collected logs,
logs have been you can search and export the logs in Log module, and backup,
collected by import, and clean the logs in System>Log Backup Man-
HSM agement.
Before version After upgrading to version 2.5R2 or above, you can search and
2.5R2, and export the new collected logs in Log, and backup, import, and
logs are not clean the logs in System>Log Backup Management.
collected by
HSM
Version 2.5R2 You can search and export the logs in Log, and backup, import,
or above and clean the logs in System>Log Backup Management.
Log
HSM system optimizes the log management function, using a new searching, backup, importing,
and cleaning method to manage logs. The type of log can be categorized as online log, offline log
and operation log.
l System log: Logs of the managed devices, including event logs, alarm logs, networks logs and
configuration logs.
l Treat log: Logs of invasion and attack behaviors, including IPS logs, security logs, threat logs,
web security logs and anti defacement logs.
l NBC log: Logs related to network behavior of managed devices, including URL logs, IM logs,
webpost logs, email logs and FTP logs. URL logs, IM logs and webpost logs support binary
and text format.
l Traffic log: Logs of traffic, including NAT logs, NAT444 logs, session logs 、PBR logs and
SLB logs.
Operation log: Refers to HSM system logs, which record the local operation events of HSM sys-
tem.
Log Severity
Event logs are categorized into eight severity levels, each level has its own color.
Related Topics:
For more information about Log function, see the followings:
Introduction to Log Window
Searching Logs
Log Filter
Searching is available for online and offline logs, not for operation logs. You may input values for
filters and keywords to query result that matches your criteria.
Option Description
Search Box Enter keywords or click filter name to insert into the search
box. When you hover your mouse over , search tips will be
Time Range Select the time range of logs for you query.
Click Save button to save the searching task. When you switch
pages or make other queries, the run in background task keeps
running. When a query takes a long time, you may click the
Save & E-mail icon to put the query into background, when
the query is complete, you will receive an email notice.
Note:To send an email from HSM, you need to set up mail-
box first, refer to Configuring an Email Account.
Option Description
Operation res- Use the result of a query as a filter, including success, unkown,
ult failure.
Log Chart
Log number of different time is shown in bar chart. You may view the detailed diagram by click-
ing a bar.
Toolbar
The toolbar contains operation icons.
Option Description
Merge Log System can merge logs which have the same firewall or the
same severity. Thus it can help reduce logs and avoid to
receive redundant logs.
Log Window
Log window shows detailed log list. The log window may vary slightly on different navigation
pane.
Option Description
l Offline log: logs that are imported into HSM from other server. For more information about
how to import the logs, see Log Import.
HSM supports viewing logs by log types. You can set conditions to filter log messages, including
FW, Generation Time, Severity, Category, Interface, Out Interface, Source Zone and Destination
Zone.
Online/Offline Log
The type of searching can be divided into the followings:
l Temporarily searching: Click the search button for direct local searching. The temporarily
l Backstage searching: After temporarily searching, click the backstage running button
to create the backstage searching task. In case of closing the searching page or running other
searchings, the task of backstage searching will keep running.
4. In Log Filter, click a filter name, and input a value for this filer. You may select more than
one filters.
5. You can quickly add filter conditions for the three types below:
l Filter by log types: Click a log type from the left navigation.
Notes:
l Hover your mouse over the icon to view search tips.
l To save your search filters, click to store them in the bookmark tab (in the
l The history and collection can automatically open while you use the search
box.
Operation Log
To view operation log, take the following steps:
1. Select Log from the level-1 navigation pane. The log window appears.
2. From the left Log Navigation Pane, Click Operation Log to view HSM system operation
logs.
3. Choose the log types you want in the log navigation bar, and set a filter condition in the fil-
ter bar, then click Search. The logs meeting requirements will be shown in the log window.
l Operation Result: Choose an operation result from the drop-down list, including All,
Waiting, Success, Failure.
Exporting Logs
To export logs, take the following steps:
1. Select Log from the level-1 navigation pane and the log window appears.
2. In the log navigation bar, choose the log types and time to export, and then set the filter con-
ditions to filter logs.
3. Select the "Export to local disk" or "Export to ftp server" from the dropdown list.
Option Description
Option Description
means as follows:
l %Y: year;
l %m: month;
l %d: day;
l %H: hour;
l %M: minute;
FTP/SFTP Select the FTP server to store the forwarded log files
Server from the drop-down list, then the corresponding FTP
server settings will be displayed. You can click Detection