03-Security Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath M9000 Configuration Guide(V7)(E9X71)-6W70003-Security Configuration Guide
31-Trusted access control configuration
Title Size Download
31-Trusted access control configuration 45.69 KB

 

Configuring CSAP trusted access control

About CSAP trusted access control

Threat Discovery and Security Operations Platform (CSAP) trusted access control enables the device to collaborate with the CSAP trusted access controller to obtain security status of users and assets. Upon receiving an access request from a user, the device takes relevant action based on the user and asset security status and the specified trusted access policy.

In the zero trust scenario, you can use this feature to control access permissions for users to specific assets.

Configuring CSAP trusted access control settings

About this task

The device collaborates with the CSAP trusted access controller to obtain security status of users and assets, and controls access permissions for users to specific assets based on the specified trusted access policy.

Procedure

1.     Enter system view.

system-view

2.     Enter CSAP trusted access controller view.

trusted-access controller csap

3.     Specify the peer service URL used for providing trusted access control services.

peer-service url service-url

By default, no peer service URL is specified.

4.     (Optional.) Specify an SSL client policy used for establishing an SSL connection to the trusted access controller.

ssl-client-policy policy-name

By default, no SSL client policy is specified for establishing an SSL connection to the trusted access controller.

This command is required if the protocol type is HTTPS for the peer service URL.

5.     (Optional.) Specify a VPN instance for the trusted access controller.

vpn-instance vpn-instance-name

By default, no VPN instance is specified for the trusted access controller.

Configuring a CSAP trusted access policy

About this task

A CSAP trusted access policy defines user access permissions to assets based on the security status of users and assets.

Perform this task to configure trusted access rules that specify the actions to take on user requests to access assets based on their security statuses.

Restrictions and guidelines

The device predefines 16 trusted access rules that can be edited. You cannot create or delete rules.

Procedure

1.     Enter system view.

system-view

2.     Enter CSAP trusted access policy view.

trusted-access policy csap

3.     Configure a trusted access rule.

rule user-risk-level { fallen | high-risk | low-risk | trust } asset-risk-level { fallen | high-risk | low-risk | trust } action { allow | deny }

By default, the trusted access rule settings are as shown in Table 1.

Table 1 Default trusted access rule settings

User security status

Asset security status

Action

Compromised

Compromised

Deny

Compromised

High risk

Deny

Compromised

Low risk

Deny

Compromised

Trusted

Deny

High risk

Compromised

Deny

High risk

High risk

Deny

High risk

Low risk

Deny

High risk

Trusted

Deny

Low risk

Compromised

Deny

Low risk

High risk

Deny

Low risk

Low risk

Allow

Low risk

Trusted

Allow

Trusted

Compromised

Deny

Trusted

High risk

Deny

Trusted

Low risk

Allow

Trusted

Trusted

Allow

 

4.     Enable the CSAP trusted access policy.

service enable

By default, the CSAP trusted access policy is disabled.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网