HP X Unified Security Platform Series User Manual Page 145

  • Download
  • Add to my manuals
  • Print
  • Page
    / 333
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 144
6
X Family LSM User’s Guide V 2.5.1 129
Network
The Network section describes IP interfaces, security zones, DHCP functionality, routing, and IP
address groups and explains how to enable, disable, and modify their various features. The
network tools provided by the LSM are also described.
Overview
The Network menu pages in the LSM enable you to set up the X family device so that it can work within
your network environment. The following menu options are available:
Network Ports — manage port configuration (auto-negotiation and line speed), disable/enable or
restart a port.
Security Zones — create and manage security zones that logically segment your network by ports
and VLANs so that to you can apply firewall rules and IPS filters to traffic passing between sections.
IP interfaces — manage and configure the internal and external IP interfaces the device uses to
make the network connections for your environment. Each security zone must be associated with an
IP interface.
IP address groups — create and manage groups of IP address group by host, subnet, or address
range. You can use these IP address group to simplify configuration of device features.
DNS — configure the global DNS servers and search domains for the device, or choose to use the
DNS configuration obtained from the WAN connection.
Default Gateway — if you have configured the External Interface with a static IP address, use this
option to manually configure the default IP address that the device uses to route packets when it has
no other route to a given IP address.
Routing — configure the static and dynamic routing for the device and enable/global options for
unicast (RIP) and multicast routing (IGMP, and PIM-DM)
DHCP Server enable the device to act as a DHCP server and configure the server settings.
To ols — access tools to lookup DNS names, find the physical interface/security zone that the device
would use to reach a given location, capture traffic on the device for analysis, ping devices on the
network, and trace the network hops traffic takes from the device to another device in the network.
Page view 144
1 ... 144 145 146 ... 333

Comments to this Manuals

No comments