As an industry-leading integrated security management center, H3C SecCenter provides unified management for various network and security products and over 1000 types of reports on network security status and regulatory compliance.
H3C SecCenter adopts advanced in-depth probing and analysis technologies and integrates security event collection, analysis, and response to combine the network with security devices, explicitly show the network security status, respond quickly to security events, and facilitate network fault locating, thus relieving the IT and security administrator from heavy management workload and greatly improving the work efficiency. In this case, the customer can focus on the core business.
Figure 1 IPS Manager Intrusion protection event snapshoot
Figure 2 Firewall Top 10 attack event screen
Figure 3 UTM Virus protection event snapshoot
Figure 4 iTAS traffic analysis by application
H3C SecCenter Management Center is a one box solution for managing the security devices on a network. It includes the function modules: IPS Manager, UTM Manager, Firewall Manager and intelligent Traffic Analysis System (iTAS). All modules can also be purchased separately and run independently on any servers running Windows operating systems.
IPS Manager allows central management of H3C IPS devices. It can be used to implement real-time monitoring and analysis of security events, catch event snapshot, query event details, update the intrusion signature library over all IPS devices, and to provide rich security reports.
UTM Manager allows management and control of all H3C UTM devices in the network. It features great scalability, visualized real-time event monitoring, comprehensive security event analysis (such as attack and virus event analysis), controlling and auditing based on applications and services, and rich report function. The UTM manager enables customers to learn and control the network security status at any time. Together with UTM devices, the UTM Manager provides you with visual, all-around, powerful network security protection.
Firewall Manager supports centralized management and real-time monitoring of firewall devices throughout the network, implements collection and comprehensive analysis of attack event information, enables log auditing and visualization, detailed reports. From the all-around reports, you can see the history security status as well as the security trends of the network easily.
iTAS provides a reliable and easy-to-use network traffic analysis solution. iTAS helps track the bandwidth usage, and resource consumption of each network application by collecting the traffic information from the routers and switches in sFlow, NetFlow or NetStream format. Moreover, rich traffic analysis report are provided to help identify the network bottlenecks and make correct impersonal decision on network planning, monitoring, optimization and troubleshooting. iTAS is also useful to detect the abnormal traffic, Denial of Service attack and worms.
The following contents are relatively complicated, please use PC for browsing.
Pls enter c.h3c.com.cn in the PC browser and follow the instruction from the page, you will continue to sync to PC.
Continue mobile phone browsing.
H3C SecCenter can manage network devices, such as routers, switches, firewalls, UTMs, IPSs and servers, to achieve centralized management of network resources, guarantee the safe running of the entire network and detect in time faults and performance bottlenecks of the network and system hosts.
H3C SecCenter can complete automatic device detection and topology arrangement according to users’ preset conditions. It supports user-defined views so that users can draw customized network topology clearly and flexibly according to their organizational structure, geographic locations and even building conditions. The customized topology greatly helps users view key devices on the entire network.
H3C SecCenter monitors security events on the network in real time. It generates a complete event snapshot after collecting and displaying various types of attack, virus and worm events in a centralized manner. The event snapshot lists the statuses of security events that occurred in the last one hour.
H3C SecCenter can measure and analyze in a centralized manner the security events on the network, provide various types of visual and detailed reports. In panoramic analysis reports, users can view the history security conditions and future security trends of the entire network.
H3C SecCenter provides powerful auditing capacity and can get quickly correlative security event information from history data. By querying data in depth, users can analyze specific security events and trace them, thus discovering attack sources and root causes. With such in-depth query capacity, H3C SecCenter can solve many types of user problems.
H3C SecCenter provides network traffic analysis and exception detection to help administrators find in time network bottlenecks and precisely determine abnormal services, effectively prevent such activities as mass bandwidth consumption and guarantee network availability.
By clicking a device on the device list, users can directly access the Web management interface for the corresponding device. No username or password is required in this way and single-point login is achieved. Users can configure and maintain multiple devices at one time.
H3C follows the development trends of network technologies, security technologies and network attacks and defending, and regularly updates and releases feature upgrade package. It offers full-inclusive and timely feature libraries, including protocol feature library, IPS feature library, AV feature library and so on. H3C SecCenter can automatically detect the feature libraries and current application status on devices, and help users get information about feature library update any time.
Includes start time, stop time, protocol, source IP, destination IP, service type, input interface, output interface, packages, bytes, stream volume, total active time, operators, log type.
Supports NetStream/NetFlow V5 and V9.
Real-time traffic monitoring
Displays traffic history by period.
Monitors networks, routers, ports, subnet, IP groups.
Displays total input stream & output stream trends.
Displays the maximal, minimal and average ratio of specific periods.
Business Traffic Trends Analysis
Displays the ratio of business traffic changes by time.
Displays the order of business traffic volumes.
Displays the summary report of all business traffic trends.
Displays the details of business traffic by digging data.
Top N Nodes by Traffic
Displays Top N source node list.
Displays Top N destination node list.
Displays the traffic details of every Top N nodes.
TopN Session Report
Displays Top N input & output traffic session list.
Displays the traffic details of every Top N session.
Customizable report export configuration, such as report period, export format.
Abnormal Traffic Detection
Abnormal Traffic Monitoring
Detects abnormal traffic of devices, interfaces, and destination IP addresses.
Turns on/off the detection feature.
Based line detection module.
Shows details of abnormal traffic alarm, and tracks abnormal traffic.
Shows details of history alarm.
Abnormal Traffic Detection Configuration
Sets the type of traffic detection, including interface traffic, TCP traffic, UDP traffic, HTTP traffic.
Sets the threshold of abnormal traffic.
Abnormal Traffic Alarm Configuration
Sets alarm threshold and enables to send noficiation to the administrator when detecting abnormal traffic.
Sends alarm by time period with Email, SNMP Trap, etc.
Upgrading Signature Packages
This module allows you to upgrade the signature packages of all managed devices simultaneously, and display the version of signature packages, including IPS and AV signature packages.
This module allows you to add and delete devices, upgrade signature packages, view the detailed information of devices, and change the areas and labels of the devices.
Intel P4 2.0 CPU or equivalent
Window 2003 Server or Window XP with the up-to-date patches
IE 6.0 or above
We recommend you to purchase computers according to this configuration.