Security policy redundancy analysis

This help contains the following topics:

Introduction

This feature allows the system to compare the filtering criteria of existing security policies and identify redundant policies for users to simplify the configuration. Redundant security policies do not take effect because no packets can match the policies. A security policy is considered redundant in the following conditions:

To avoid effect on the network, perform this task when the traffic load is light. As a best practice, perform redundancy analysis right after you complete configuring security policies.

The system performs redundancy analysis again automatically if a security policy is modified from the page.

Restrictions and guidelines

Perform redundancy analysis

  1. Click Policies > Security Policies > Redundancy Analysis.

  2. Click Start to start a redundancy analysis.

    Redundant security policies will be displayed in the list in the order these policies were created.

  3. Modify or delete redundant security policies.

    • To modify a redundant policy, click the Edit icon for the policy.

    • To delete a redundant policy, select the policy, and then click Delete.