04-DPI Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath M9000 Configuration Guide(V7)(E9X71)-6W70004-DPI Configuration Guide
14-DLP configuration
Title Size Download
14-DLP configuration 185.68 KB

Configuring DLP

About DLP

Data loss prevention (DLP) is used to detect sensitive information in files transferred by the device and notify users of sensitive information leakage by logs or emails. This feature facilitates users to harden data security.

DLP mechanisms

As shown in Figure 1, the device uses the DPI engine and DLP engine to perform DLP flow monitoring. The DPI engine performs file extraction and the DLP engine performs sensitive information detection. For more information about the DPI engine, see "Configuring DPI engine."

DLP uses the following workflow:

1.     The DPI engine extracts files from the traffic to inspect.

2.     The DPI engine stores the files to the storage medium of the device.

3.     The DPI engine notifies the DLP engine to scan the files.

4.     The DLP engine scans and reads the files from the storage medium.

5.     The DLP engine detects sensitive information in the files.

6.     The DLP engine sends a notification by log or email based on the detection result.

Figure 1 DLP mechanism

 

File extraction

As shown in Figure 2, the DPI engine identifies the application layer information and extracts files in packets as follows:

1.     Filters traffic by using the following filtering criteria:

¡     Traffic direction—Matches the packet transmission direction. Options include external-to-internal, internal-to-external, and bidirectional.

¡     Internal IP address—Matches the destination IP address of packets transferred in the external-to-internal direction and matches the source IP address of packets transferred in the internal-to-external direction.

¡     Packet protocol—Matches the application layer protocol of packets.

2.     Identifies the application layer protocol of the matching packets, FTP or SMTP, for example.

3.     Identifies the behavior of the matching packets, for example, uploading a file or sending an email.

4.     Searches the signature libraries to identify the start and end locations of the files to be extracted in the packets.

5.     Extracts the files from the packets, saves the extracted files locally on the device, and assigns a unique URL to each file for the DLP engine to access.

Figure 2 DPI engine operation process

 

Sensitive information detection

If the extracted file is a compressed file, the DLP engine will decompress the file and perform sensitive information detection on the extracted file as follows:

1.     Uses the detection rule to match the file content.

2.     Uses the identity rule to match the identity of the sender or recipient.

3.     Uses the response rule to match the detection result.

4.     Sends a notification.

Figure 3 DLP engine operation process

 

Detection rule

A detection rule includes the following items:

·     Regular expression—Used to identify sensitive file signatures.

·     Keyword—A string used to identify sensitive file signatures.

·     Fingerprint file—Sensitive file hash code.

·     File name—Sensitive file name.

·     File size—Sensitive file size.

·     File type—Sensitive file type.

·     Protocol—File transfer protocol.

A file matches a detection rule only when its content matches all items in that detection rule. You must set a severity level for each detection rule. If a file matches a detection rule of the specified severity level, the system generates an event of that severity level accordingly.

Identity rule

An identity rule includes the following items:

·     IP address—IP address of the file sender or file recipient.

·     Email address—Email address of the file sender or file recipient.

·     User—User name of the file recipient.

The file sender or recipient matches an identity rule only when its identity information matches all items in that identity rule. You must set a severity level for each identity rule. If a file matches an identity rule of the specified severity level, the system generates an event of that severity level accordingly.

Response rule

A response rule includes the following items:

·     Severity level—DLP event severity level.

·     Protocol—Protocol for the file in which sensitive information is detected.

A DLP event matches a response rule only when the event matches all items in that response rule. If a matching response rule is found, the DLP engine will send a notification by log, email, or others according to the response rule.

Restrictions: Hardware compatibility with DLP

Hardware platform

Module type

DLP compatibility

M9006

M9010

M9014

Blade IV firewall module

Yes

Blade V firewall module

No

NAT module

No

M9010-GM

Encryption module

Yes

M9016-V

Blade V firewall module

No

M9008-S

M9012-S

Blade IV firewall module

Yes

Intrusion prevention service (IPS) module

Yes

Video network gateway module

Yes

M9008-S-6GW

IPv6 module

Yes

M9008-S-V

Blade IV firewall module

Yes

M9000-AI-E4

M9000-AI-E8

M9000-AI-E16

Blade V firewall module

Yes

M9000-X06

M9000-X10

Blade VI firewall module

Yes

Configuring DLP

About this task

DLP flow monitoring requires the cooperation of the DPI engine and DLP engine. The DPI engine extracts files and the DLP engine performs sensitive information detection on the files.

Procedure

1.     Enter system view.

system-view

2.     Enable the TCP segment reassembly feature.

inspect tcp-reassemble enable

By default, the TCP segment reassembly feature is disabled.

For more information about this command, see DPI engine in DPI Command Reference.

3.     Disable stream fixed length inspection.

inspect stream-fixed-length disable

By default, the stream fixed length inspection feature is enabled.

For more information about this command, see DPI engine in DPI Command Reference.

4.     Activate policy and rule settings for DPI service modules.

inspect activate

By default, the creation, modification, and deletion of DPI service policies and rules do not take effect.

For more information about this command, see DPI engine in DPI Command Reference.

5.     Monitor files transferred in the specified direction.

dlp flow-monitor file-transfer { all | incoming | outgoing }

By default, DLP does not monitor files of any direction.

6.     Configure internal IP addresses for DLP flow monitoring:

a.     Enter a DLP internal address view.

dlp flow-monitor local-address { ip | ipv6 }

b.     Specify an IP address object group for DLP flow monitoring.

object-group object-group-name

By default, no IP address object groups are specified for DLP flow monitoring.

7.     (Optional.) Configure DLP flow monitoring for specific protocols:

a.     Enter DLP protocol configuration view.

dlp flow-monitor protocol

b.     Disable DLP flow monitoring for specific protocols.

disable protocol { all | type protocol-name }

By default, DLP flow monitoring is enabled for all DLP-supported protocols.

8.     Configure a DLP policy.

A DLP policy includes detection rules, identity rules, and response rules. You can configure the DLP policy from the Web interface. For more information, see DLP online help.

9.     Enable DLP.

undo dlp bypass

By default, DLP is enabled.

Display and maintenance commands for DLP

Execute display commands in any view.

 

Task

Command

Display IPv4 address object group configuration for DLP flow monitoring.

display dlp flow-monitor local-address ip config

Display IPv6 address object group configuration for DLP flow monitoring.

display dlp flow-monitor local-address ipv6 config

Display DLP flow monitoring status for all protocols supported by DLP.

display dlp flow-monitor protocol config

 

DLP configuration examples

Example: Configuring DLP

Network configuration

As shown in Figure 4, the device is deployed at the edge of the internal network in a company to detect and notify internal sensitive file leakage events. Configure the device to log the following security events:

·     Sensitive file abc.zip is leaked.

·     An internal user sends an email to sensitive email box xyz@mm.com in the external network.

Figure 4 Network diagram

Procedure

1.     Assign IP addresses to interfaces:

# Assign an IP address to GigabitEthernet 1/0/1.

<Device> system-view

[Device] interface gigabitethernet 1/0/1

[Device-GigabitEthernet1/0/1] ip address 192.168.1.1 255.255.255.0

[Device-GigabitEthernet1/0/1] quit

# Assign IP addresses to other interfaces in the same way. (Details not shown.)

2.     Add interfaces to security zones.

[Device] security-zone name trust

[Device-security-zone-Trust] import interface gigabitethernet 1/0/1

[Device-security-zone-Trust] quit

[Device] security-zone name untrust

[Device-security-zone-Untrust] import interface gigabitethernet 1/0/2

[Device-security-zone-Untrust] quit

3.     Configure a security policy rule named trust-untrust to permit traffic from the hosts in security zone Trust to the Internet.

[Device] security-policy ip

[Device-security-policy-ip] rule name trust-untrust

[Device-security-policy-ip-1-trust-untrust] source-zone trust

[Device-security-policy-ip-1-trust-untrust] destination-zone untrust

[Device-security-policy-ip-1-trust-untrust] source-ip-subnet 192.168.1.0 24

[Device-security-policy-ip-1-trust-untrust] action pass

[Device-security-policy-ip-1-trust-untrust] quit

[Device-security-policy-ip] quit

4.     Configure DPI:

# Enable the TCP segment reassembly feature.

[Device] inspect tcp-reassemble enable

# Disable stream fixed length inspection.

[Device] inspect stream-fixed-length disable

# Activate policy and rule settings for DPI service modules.

[Device] inspect activate

5.     Configure DLP flow monitoring:

# Monitor traffic transferred from the internal network to the external network.

[Device] dlp flow-monitor file-transfer outgoing

# Configure IP address object group obj1 and specify internal IP addresses in the object group.

[Device] object-group ip address obj1

[Device-obj-grp-ip-obj1] network subnet 192.168.1.0 24

[Device-obj-grp-ip-obj1] quit

# Specify the IP address object group for DLP flow monitoring.

[Device] dlp flow-monitor local-address ip

[Device-dlp-flow-monitor-local-addr-ip] object-group obj1

[Device-dlp-flow-monitor-local-addr-ip] quit

# Enable DLP.

[Device] undo dlp bypass

6.     Configure a DLP policy:

a.     Log in to the Web interface of the device.

b.     Select Policies > DLP > DLP Policies.

c.     Click Create.

d.     In the dialog box that opens, configure parameters for the DLP policy:

-     Enter a policy name.

-     Select a scan mode.

-     Select Start policy.

Figure 5 Creating a DLP policy

 

e.     On the Detection Rules tab of the Create DLP Policy dialog box, click Create in the Add Rule area.

f.     Configure parameters for the detection rule:

-     Enter a rule name.

-     Select a severity level.

-     Configure the match conditions as matching the file named abc.zip.

Figure 6 Creating a detection rule

 

Figure 7 Creating a match condition

 

g.     Click OK. Then, click the Identity Rules tab on the Create DLP Policy dialog box and click Create in the Add Rule area.

h.     Configure parameters for the identity rule:

-     Enter a rule name.

-     Select a severity level.

-     Configure the match conditions as matching the recipient at xyz@mm.com.

Figure 8 Creating an identity rule

 

Figure 9 Creating a match condition

 

i.     Click OK. Then, click the Response Rules tab on the Create DLP Policy dialog box and create a response rule.

j.     Configure parameters for the response rule:

-     Enter a rule name.

-     Configure the match conditions as matching security events with the medium severity level.

-     Configure the action as sending logs.

Figure 10 Creating a response rule

 

k.     Click OK. The response rule is created.

l.     Click OK. The DLP policy is created.

Verifying the configuration

# Verify that the device can generate log messages when it detects that file abc.zip has been leaked or an internal user has sent an email to email box xyz@mm.com. (Details not shown.)

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网