08-Internet Access Behavior Management Command Reference

HomeSupportReference GuidesCommand ReferencesH3C SecPath M9000 Command Reference(V7)(E9X71)-6W70008-Internet Access Behavior Management Command Reference
02-Application audit and management commands
Title Size Download
02-Application audit and management commands 124.35 KB

Application audit and management commands

This feature parses personal information from user packets and must be used for legitimate purposes.

The following compatibility matrixes show the support of hardware platforms for application audit and management:

 

Hardware platform

Module type

Application audit and management compatibility

M9006

M9010

M9014

Blade 4 firewall module

Yes

Blade 5 firewall module

No

NAT module

No

M9010-GM

Encryption module

Yes

M9016-V

Blade 5 firewall module

No

M9008-S

M9012-S

Blade 4 firewall module

Yes

Intrusion prevention service (IPS) module

Yes

Video network gateway module

Yes

M9008-S-6GW

IPv6 module

Yes

M9008-S-V

Blade 4 firewall module

Yes

M9000-AI-E4

M9000-AI-E8

M9000-AI-E16

Blade 5 firewall module

Yes

M9000-X06

M9000-X10

Blade 6 firewall module

Yes

vSystem supports all application audit and management features. For more information about vSystem, see Virtual Technologies Configuration Guide.

application

Use application to configure an application or application group as a match criterion for an application audit and management policy.

Use undo application to delete an application or application group match criterion from an application audit and management policy.

Syntax

application { app application-name | app-group application-group-name }

undo application { app application-name | app-group application-group-name }

Default

No application or application group is used as a match criterion.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

app application-name: Specifies an application by its name, a case-insensitive string of 1 to 63 characters.

app-group application-group-name: Specifies an application group by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can configure this command only in an audit-free policy or deny policy.

You can configure this command multiple times to specify multiple applications or application groups.

Examples

# Specify applications app1 and app2 and application groups group1 and group2 for policy mypolicy2 to match packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy2 deny

[Sysname-uapp-control-policy-mypolicy2] application app app1

[Sysname-uapp-control-policy-mypolicy2] application app app2

[Sysname-uapp-control-policy-mypolicy2] application app-group group1

[Sysname-uapp-control-policy-mypolicy2] application app-group group2

Related commands

app-group (Security Command Reference)

nbar application (Security Command Reference)

port-mapping (Security Command Reference)

description

Use description to set a description for a keyword group.

Use undo description to restore the default.

Syntax

description text

undo description

Default

No description exists for a keyword group.

Views

Keyword group view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

text: Specifies a description, a case-sensitive string of 1 to 255 characters.

Examples

# Set the description to account limit for keyword group mykeywordgroup.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] keyword-group name mykeywordgroup

[Sysname-uapp-control-keyword-group-mykeywordgroup] description account limit

destination-address

Use destination-address to configure a destination IP address object group as a match criterion for an application audit and management policy.

Use undo destination-address to remove a destination IP address object group as a match criterion from an application audit and management policy.

Syntax

destination-address { ipv4 | ipv6 } object-group-name

undo destination-address { ipv4 | ipv6 } object-group-name

Default

No destination IP address object group is used as a match criterion.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

ipv4: Specifies an IPv4 address object group.

ipv6: Specifies an IPv6 address object group.

object-group-name: Specifies an existing address object group by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can configure this command multiple times to specify multiple IPv4 or IPv6 address object groups.

Examples

# Specify IPv4 address object groups obgroup3 and obgroup4 for policy mypolicy1 to match destination IPv4 addresses of packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] destination-address ipv4 obgroup3

[Sysname-uapp-control-policy-mypolicy1] destination-address ipv4 obgroup4

Related commands

object-group (Security Command Reference)

destination-zone

Use destination-zone to configure a destination security zone as a match criterion for an application audit and management policy.

Use undo destination-zone to delete a destination security zone match criterion from an application audit and management policy.

Syntax

destination-zone destination-zone-name

undo destination-zone destination-zone-name

Default

No destination security zone is used as a match criterion.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

destination-zone-name: Specifies a destination security zone by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can configure this command multiple times to specify multiple destination security zones.

Examples

# Specify destination security zones zone3 and zone4 for policy mypolicy1 to match packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] destination-zone zone3

[Sysname-uapp-control-policy-mypolicy1] destination-zone zone4

Related commands

security-zone name (Security Command Reference)

disable

Use disable to disable an application audit and management policy.

Use undo disable to enable an application audit and management policy.

Syntax

disable

undo disable

Default

An application audit and management policy is enabled.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

If an application audit and management policy is not used, use this command to disable it. A disabled policy does not participate in traffic matching. You can copy, rename, and move a disabled policy.

Examples

# Disable application audit and management policy mypolicy1.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1

[Sysname-uapp-control-policy-mypolicy1] disable

keyword

Use keyword to add a keyword to a keyword group.

Use undo keyword to delete a keyword from a keyword group.

Syntax

keyword keyword-value

undo keyword keyword-value

Default

No keywords exist in a keyword group.

Views

Keyword group view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

keyword-value: Specifies a keyword, a case-sensitive string of 1 to 63 characters.

Examples

# Add keyword keywordname to keyword group mykeywordgroup.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] keyword-group name mykeywordgroup

[Sysname-uapp-control-keyword-group-mykeywordgroup] keyword keywordname

keyword-group name

Use keyword-group name to create a keyword group and enter its view, or enter the view of an existing keyword group.

Use undo keyword-group name to delete a keyword group.

Syntax

keyword-group name keyword-group-name

undo keyword-group name keyword-group-name

Default

No keyword groups exist.

Views

Application audit and management view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

keyword-group-name: Specifies a keyword group by its name, a case-insensitive string of 1 to 63 characters.

Examples

# Create a keyword group named mykeywordgroup and enter its view.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] keyword-group name mykeywordgroup

[Sysname-uapp-control-keyword-group-mykeywordgroup]

policy copy

Use policy copy to copy an application audit and management policy.

Syntax

policy copy policy-name new-policy-name

Default

No application audit and management policies exist.

Views

Application audit and management view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

policy-name: Specifies an application audit and management policy to be copied by its name, a case-insensitive string of 1 to 63 characters.

new-policy-name: Specifies a name for the new application audit and management policy, a case-insensitive string of 1 to 63 characters.

Usage guidelines

If an application audit and management policy to be created is similar to an existing policy, create the policy by copying the existing policy and then modify it.

Examples

# Create an application audit and management policy named policy2 by copying policy policy1.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy copy policy1 policy2

policy default-action

Use policy default-action to configure the default action for application audit and management policies.

Syntax

policy default-action { deny | permit }

Default

The default action for application audit and management policies is permit.

Views

Application audit and management view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

deny: Drops packets.

permit: Allows packets to pass.

Usage guidelines

If a packet does not match any application audit and management policy, the device applies the default action to the packet.

Examples

# Configure the default action as deny for application audit and management policies.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy default-action deny

policy move

Use policy move to move an application audit and management policy to a new position.

Syntax

policy move policy-name1 { after | before } policy-name2

Views

Application audit and management view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

policy-name1: Specifies an application audit and management policy to be moved by its name, a case-insensitive string of 1 to 63 characters. The traffic rule can be a parent or child traffic rule.

after: Moves the specified policy to the position after a target policy.

before: Moves the specified policy to the position before a target policy.

policy-name2: Specifies the target policy by its name, a case-insensitive string of 1 to 63 characters.

Examples

# Create two application audit and management policies named policy1 and policy2, and move policy1 to the position after policy2.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name policy1 audit

[Sysname-uapp-control-policy-policy1] quit

[Sysname-uapp-control] policy name policy2 audit

[Sysname-uapp-control-policy-policy2] quit

[Sysname-uapp-control] policy move policy1 after policy2

policy name

Use policy name to create an application audit and management policy and enter its view, or enter the view of an existing policy.

Use undo policy name to delete an application audit and management policy.

Syntax

policy name policy-name [ audit | deny | noaudit ]

undo policy name policy-name

Default

No application audit and management policies exist.

Views

Application audit and management view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

policy-name: Specifies a name for the application audit and management policy, a case-insensitive string of 1 to 63 characters. The name must be globally unique.

audit: Creates an audit policy.

deny: Creates a deny policy.

noaudit: Creates an audit-free policy.

Usage guidelines

You must specify the policy type when creating a policy. Application audit and management policies have the following types:

·     Audit policy—Audits packets that meet match criteria in the policy.

·     Audit-free policy—Does not audit packets that meet match criteria in the policy.

·     Deny policy—Drops packets that meet match criteria in the policy.

The application command can be configured only in an audit-free policy or deny policy.

The following commands can be configured only in an audit policy:

·     rule.

·     rule default-action.

·     rule match-method.

Examples

# Create an application audit and management policy named mypolicy1 and enter its view.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1]

policy rename

Use policy rename to rename an application audit and management policy.

Syntax

policy rename old-policy-name new-policy-name

Views

Application audit and management view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

old-policy-name: Specifies the old name of the policy, a case-insensitive string of 1 to 63 characters.

new-policy-name: Specifies a new name for the policy, a case-insensitive string of 1 to 63 characters.

Examples

# Create an application audit and management policy named policy1, and rename the policy as policy2.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name policy1 audit

[Sysname-uapp-control-policy-policy1] quit

[Sysname-uapp-control] policy rename policy1 policy2

rule

Use rule to configure an audit rule.

Use undo rule to delete an audit rule.

Syntax

rule rule-id { app app-name | app-category app-category-name | any } behavior { behavior-name | any } bhcontent { bhcontent-name | any } { keyword { equal | exclude | include | unequal } { keyword-group-name | any } | integer { equal | greater | greater-equal | less | less-equal | unequal } { number } } action { deny | permit } [ audit-logging ]

rule rule-id { email-bomb-defense [ interval interval max-number email-number ] | email-send-restriction } * action { deny | permit } [ audit-logging ]

undo rule rule-id

Default

No audit rules exist.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

rule-id: Specifies a rule ID in the range of 1 to 64.

app app-name: Audits an application specified by its name.

app-category app-category-name: Audits an application category specified by its name.

any: Audits all applications and application categories.

behavior behavior-name: Audits a behavior specified by its name.

behavior any: Audits all behaviors.

bhcontent bhcontent-name: Audits a behavior content specified by its name.

bhcontent any: Audits all behavior contents.

keyword: Matches behavior contents by a string-type keyword.

·     equal: Matches behavior contents that are the same as the keyword.

·     exclude: Matches behavior contents that do not include the keyword.

·     include: Matches behavior contents that include the keyword.

·     unequal: Matches behavior contents that are different from the keyword.

keyword-group-name: Specifies a keyword group by its name.

any: Audits all behavior contents of an application or application category.

integer: Matches behavior contents by a number.

·     equal: Matches behavior contents that are equal to the number.

·     greater: Matches behavior contents that are greater than the number.

·     greater-equal: Matches behavior contents that are greater than or equal to the number.

·     less: Matches behavior contents that are smaller than the number.

·     less-equal: Matches behavior contents that are smaller than or equal to the number.

·     unequal: Matches behavior contents that are not equal to the number.

number: Specifies a number in the range of 0 to 4294967295.

action: Specifies the action to take on packets that match the audit rule.

·     deny: Denies matching packets.

·     permit: Allows matching packets to pass.

audit-logging: Generates audit logs for packets that match the audit rule. If you do not specify this keyword, audit logs are not generated for packets that match the audit rule.

email-bomb-defense: Configures email bomb prevention.

interval interval: Specifies the detection time in the range of 1 to 5 minutes. The default is 1 minute.

max-number email-number: Specifies the maximum number of emails that can be received from the same user during the detection time.

email-send-restriction: Enables preventing users from sending emails to users of a different domain.

 

Usage guidelines

After a packet matches all match criteria in an application audit and management policy, the device performs a finer audit on the packet.

·     If a packet matches all items in an audit rule, the action in the audit rule is taken on the packet.

·     If a packet matches only the specified application or application category in an audit rule, the packet is allowed to pass through.

·     If a packet does not match the specified application or application category in an audit rule, the default action for audit rules is taken on the packet.

This command can be configured only in an audit policy.

For WeChat and QQ, specific messages cannot be audited.

An audit rule provices the following functions:

·     General auditing—Performs granular control on user behaviors.

·     Email protection—Detects incoming emails, counts emails based on recipients, and protects recipients from attacks. Specifically, you can configure the following functions:

¡     Limit email sending—Prevents users from sending emails to users of a different domain. For example, the user at user1@abc.com cannot receive emails from the user at user2@123.com.

¡     Prevent email bombing—Protects recipients from being overwhelmed by large numbers of emails from the same sender during a short period of time.

Examples

# Create an application audit and management policy named mypolicy1.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

# Create an audit rule that allows login packets from accounts that include keyword 0 in the IM application group, generating audit logs.

[Sysname-uapp-control-policy-mypolicy1] rule 1 app-category IM behavior Login bhcontent Account keyword include mykeywd2 action deny audit-logging

# Create an audit rule that enables email bombing prevention, with the permit action and logging action specified.

[Sysname-uapp-control-policy-mypolicy1] rule 2 email-bomb-defense interval 1 max-number 5 action permit audit-logging

# Create an audit rule that enables email sending limitation, with the permit action and logging action specified.

[Sysname-uapp-control-policy-mypolicy1] rule 3 email-send-restriction action permit audit-logging

Related commands

keyword

keyword-group name

rule default-action

Use rule default-action to configure the default action for audit rules in an application audit and management policy.

Syntax

rule default-action { deny | permit }

Default

The default action for audit rules is permit.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

deny: Drops packets.

permit: Allows packets to pass.

Usage guidelines

If a packet does not match the application or application category in any audit rule, the device applies the default action to the packet.

Examples

# Configure the default action as deny for audit rules in policy mypolicy1.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] rule default-action deny

rule match-method

Use rule match-method to configure the match mode for audit rules in an application audit and management policy.

Syntax

rule match-method { all | in-order }

Default

The match mode for audit rules is in-order.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

all: Specifies the all match mode.

in-order: Specifies the in-order match mode.

Usage guidelines

In the in-order match mode, the device compares packets with audit rules in ascending order of rule ID. When a packet matches a rule, the device stops the match process and performs the action defined in the rule.

In the all match mode, the device compares packets with audit rules in ascending order of rule ID.

·     If a packet matches a rule with the permit action, all subsequent rules continue to be matched.

The device takes the action with higher priority on matching packets. The deny action has higher priority than the permit action.

·     If a packet matches a rule with the deny action, the device stops the match process and performs the deny action.

Examples

# Configure the match mode as all for audit rules in policy mypolicy1.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] rule match-method all

service

Use service to configure a service object group as a match criterion for an application audit and management policy.

Use undo service to delete a service object group match criterion from an application audit and management policy.

Syntax

service service-name

undo service [ service-name ]

Default

No service object group is used as a match criterion.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

service-name: Specifies an existing service object group by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can configure this command multiple times to specify multiple service object groups.

The undo service command removes all service object groups from match criteria if you do not specify a service object group or specify the system-defined service object group any.

Examples

# Specify service object groups dns-tcp and dns-udp for policy mypolicy1 to match packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] service dns-tcp

[Sysname-uapp-control-policy-mypolicy1] service dns-udp

Related commands

object-group (Security Command Reference)

source-address

Use source-address to configure a source IP address object group as a match criterion for an application audit and management policy.

Use undo source-address to remove a source IP address object group as a match criterion from an application audit and management policy.

Syntax

source-address { ipv4 | ipv6 } object-group-name

undo source-address { ipv4 | ipv6 } object-group-name

Default

No source IP address object group is used as a match criterion.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

ipv4: Specifies an IPv4 address object group.

ipv6: Specifies an IPv6 address object group.

object-group-name: Specifies an existing address object group by its name, a case-insensitive string of 1 to 63 characters.

Usage guidelines

You can configure this command multiple times to specify multiple IPv4 or IPv6 address object groups.

Examples

# Specify IPv4 address object groups obgroup1 and obgroup2 for policy mypolicy1 to match source IPv4 addresses of packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy audit

[Sysname-uapp-control-policy-mypolicy] source-address ipv4 obgroup1

[Sysname-uapp-control-policy-mypolicy] source-address ipv4 obgroup2

Related commands

object-group (Security Command Reference)

source-zone

Use source-zone to configure a source security zone as a match criterion for an application audit and management policy.

Use undo source-zone to delete a source security zone match criterion from an application audit and management policy.

Syntax

source-zone source-zone-name

undo source-zone source-zone-name

Default

No source security zone is used as a match criterion.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

source-zone-name: Specifies a source security zone by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

You can configure this command multiple times to specify multiple source security zones.

Examples

# Specify source security zones zone1 and zone2 for policy mypolicy1 to match packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] source-zone zone1

[Sysname-uapp-control-policy-mypolicy1] source-zone zone2

Related commands

security-zone name (Security Command Reference)

time-range

Use time-range to specify a time range during which an application audit and management policy is in effect.

Use undo time-range to restore the default.

Syntax

time-range time-range-name

undo time-range

Default

An application audit and management policy is in effect at any time.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

time-range-name: Specifies a time range by its name, a case-insensitive string of 1 to 32 characters.

Examples

# Specify time range work-time for policy mypolicy1.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] time-range work-time

Related commands

time-range (ACL and QoS Command Reference)

uapp-control

Use uapp-control to enter application audit and management view.

Use undo uapp-control to remove all application audit and management policy settings.

Syntax

uapp-control

undo uapp-control

Views

System view

Predefined user roles

network-admin

context-admin

vsys-admin

Usage guidelines

In application audit and management view, you can create, copy, move, and rename application audit and management policies. You can also create keyword groups in this view.

Application audit and management policies have the following types:

·     Audit policy.

·     Audit-free policy.

·     Deny policy.

Audit-free policies and deny policies provide application audit and management at a coarse level of granularity. Audit policies provide more granular application audit and management.

Examples

# Enter application audit and management view.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control]

user

Use user to configure a user as a match criterion for an application audit and management policy.

Use undo user to delete a user match criterion from an application audit and management policy.

Syntax

user user-name [ domain domain-name ]

undo user user-name [ domain domain-name ]

Default

No user is used as a match criterion.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

user-name: Specifies an identity user by its name, a case-sensitive string of 1 to 55 characters. The username cannot be a, al, or all, and cannot contain the following special characters: \ | / : * ? < > @.

domain domain-name: Matches the user in an identity domain. The domain-name argument represents the identity domain name, a case-insensitive string of 1 to 255 characters. The domain name cannot contain the following special characters: \ | / : * ? < > @. If you do not specify this option, the system matches the user among users that do not belong to any identity domain. For more information about identity domains, see user identification in Security Configuration Guide.

Usage guidelines

You can configure this command multiple times to specify multiple users.

Examples

# Specify users managers1 and managers2 for policy mypolicy1 to match packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] user managers1

[Sysname-uapp-control-policy-mypolicy1] user managers2

# Configure user managers1 in identity domain dpi for policy mypolicy1 to match packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] user managers1 domain dpi

Related commands

user-identity enable (Security Command Reference)

user-group

Use user-group to configure a user group as a match criterion for an application audit and management policy.

Use undo user-group to delete a user group match criterion from an application audit and management policy.

Syntax

user-group user-group-name [ domain domain-name ]

undo user-group user-group-name [ domain domain-name ]

Default

No user group is used as a match criterion.

Views

Application audit and management policy view

Predefined user roles

network-admin

context-admin

vsys-admin

Parameters

user-group-name: Specifies an identity user group by its name, a case-insensitive string of 1 to 200 characters.

domain domain-name: Matches the user group in an identity domain. The domain-name argument represents the identity domain name, a case-insensitive string of 1 to 255 characters. The domain name cannot contain the following special characters: \ | / : * ? < > @.If you do not specify this option, the system matches the user group among user groups that do not belong to any identity domain. For more information about identity domains, see user identification in Security Configuration Guide.

Usage guidelines

You can configure this command multiple times to specify multiple user groups.

Examples

# Specify user groups group1 and group2 for policy mypolicy1 to match packets.

<Sysname> system-view

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] user-group group1

[Sysname-uapp-control-policy-mypolicy1] user-group group2

# Configure user group group1 in identity domain dpi for policy mypolicy1 to match packets.

<Sysname> system-view

[Sysname] uapp-control

[Sysname-uapp-control] policy name mypolicy1 audit

[Sysname-uapp-control-policy-mypolicy1] user-group group1 domain dpi

Related commands

user-identity enable (Security Command Reference)

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网