03-Policies

HomeSupportConfigure & DeployH3C Firewall Products Comware 7 Web Configuration Guide-6W40203-Policies
17-Security policy redundancy analysis
Title Size Download
17-Security policy redundancy analysis 26.81 KB

Security policy redundancy analysis

 

This help contains the following topics:

·     Introduction

·     Restrictions and guidelines

·     Perform redundancy analysis

Introduction

This feature allows the system to compare the filtering criteria of existing security policies and discover redundant policies for users to simplify the configuration. Redundant security policies do not take effect because no packets can match the policies. A security policy is considered redundant in the following conditions:

·     Two security policies have the same filtering criteria and the policy created later is considered redundant.

·     The filtering criteria of a security policy contain the filtering criteria of a security policy created later. The security policy created later is considered redundant.

To avoid effect on the network, perform this task when the traffic load is light. As a best practice, perform redundancy analysis right after you complete configuring security policies.

The system performs redundancy analysis again automatically if a security policy is modified from the page.

Restrictions and guidelines

·     This feature analyzes only enabled security policies.

·     This feature analyzes a maximum of 100 security policies at a time. If more than 100 security policies exist on the device, modify or delete the discovered redundant policies and then perform redundancy analysis again.

·     Redundancy analysis consumes CPU resources. As a best practice, perform redundancy analysis when the traffic load is light.

Perform redundancy analysis

1.     Click Policies > Security Policies > Redundancy Analysis.

2.     Click Start to start a redundancy analysis.

Redundant security policies will be displayed in the list in the order these policies were created.

3.     Modify or delete redundant security policies.

¡     To modify a redundant policy, click the Edit icon for the policy.

¡     To delete a redundant policy, select the policy, and then click Delete.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网