This help contains the following topics:
The software-defined perimeter (SDP) zero trust feature allows the device to act as an SDP gateway and cooperate with the SDP controller for user access control. It performs authentication to achieve centralized control over identities and permissions of users that access to the specified applications or APIs, avoiding illegal accesses.
Support of non-default vSystems for this feature depends on the device model. This feature is available on the Web interface only if it is supported.
Complete the following tasks before you configure this feature:
Assign IP addresses to interfaces on the Network > Interface Configuration > Interfaces page.
Configure routes on the Network > Routing page. Make sure the routes are available.
Create security zones on the Network > Security Zones page.
Add interfaces to security zones. You can add interfaces to a security zone on the Security Zones page or select a security zone for an interface on the Interfaces page.
Configure security policies to permit the target traffic on the Policies > Security Policies page.
Click the Policies tab.
In the navigation pane, select Zero Trust > SDP Zero Trust.
Configure SDP zero trust settings.
Table-1 SDP Zero trust configuration items
Item | Description |
SDP zero trust | Select this item to enable SDP zero trust, and then configure SDP zero trust settings. Click Apply after configuring SDP zero trust settings. Then, the device will act as an SDP gateway and cooperate with the SDP controller for access control. The SDP controller issues user permissions to internal resources to the SDP gateway for users to access these internal resources through the SDP gateway. |
Access mode | Select an access mode. Options include:
|
Default API rule | Select a default API rule. Options include:
|
Single packet authentication | Select this item to enable single packet authentication. After single packet authentication is enabled, the client must send an SPA packet to before accessing the SDP gateway. The SDP gateway identifies whether the client is legal. If the client is legal, the SDP gateway will permits the subsequent access request from the client. If not, the SDP will deny the access request from the client. |
SPA type | Single packet authentication supports the following modes:
This field is available only in IP access mode and mix access mode. |
Enable anti-replay | After you enable this feature, the device will identify and block authenticated duplicate UDP SPA packets, preventing the device from being vulnerable to replay attacks. However, in some scenarios, such as when the time between the client and device is unsynchronized, it might cause the device to receive packets beyond the anti-replay time window, resulting in misjudgment of replay attacks. In such cases, you can disable the anti-replay feature temporarily until the time synchronization issue is resolved. This can reduce misjudgments of replay attacks and improve user experience. Anti-replay is available only for UDP SPA packets. |
Anti-replay time window for UDP SPA | When the time difference between the timestamp of the received packet and the local time exceeds half of the anti-replay time window, the device considers the packet as a replayed packet. For example, if the anti-replay time window is 50 seconds, a packet is considered as a replay packet if the time difference between the timestamp of the received packet and the local time exceeds 25 seconds. |
Click Apply.