- Table of Contents
-
- 04-Policies
- 01-Security policy
- 02-Security policy redundancy analysis
- 03-Security policy hit analysis
- 04-Security policy optimization
- 05-Attack defense
- 06-Risk analysis
- 07-Blacklist
- 08-Connection limit
- 09-uRPF
- 10-IPCAR
- 11-IP reputation
- 12-Domain reputation
- 13-Application audit
- 14-Bandwidth management
- 15-Server connection detection
- 16-Application proxy
- Related Documents
-
Title | Size | Download |
---|---|---|
02-Security policy redundancy analysis | 26.69 KB |
This help contains the following topics:
Introduction
This feature allows the system to compare the filtering criteria of existing security policies and identify redundant policies for users to simplify the configuration. Redundant security policies do not take effect because no packets can match the policies. A security policy is considered redundant in the following conditions:
· The security policy uses the same filtering criteria as a policy created earlier.
· The security policy uses filtering criteria that are covered by a policy created earlier.
To avoid effect on the network, perform this task when the traffic load is light. As a best practice, perform redundancy analysis right after you complete configuring security policies.
The system performs redundancy analysis again automatically if a security policy is modified from the page.
Restrictions and guidelines
· This feature analyzes only enabled security policies.
· This feature analyzes a maximum of 100 security policies at a time. If more than 100 security policies exist on the device, modify or delete the discovered redundant policies and then perform redundancy analysis again.
· Redundancy analysis consumes CPU resources. As a best practice, perform redundancy analysis when the traffic load is light.
Perform redundancy analysis
1. Select Policies > Security Policies > Redundancy Analysis.
2. Click Start to start a redundancy analysis.
Redundant security policies will be displayed in the list in the order these policies were created.
3. Modify or delete redundant security policies.
¡ To modify a redundant policy, click the Edit icon for the policy.
¡ To delete a redundant policy, select the policy, and then click Delete.