This help contains the following topics:
Data Loss Prevention (DLP) monitors and analyzes the traffic passing through network devices to identify and classify the data transmission and take the configured preventive actions against illegal data transmission.
A DLP policy defines one or more signatures to identify illegal data transmission and defines defensive actions, for example, output alarm logs, and send alarm emails.
A DLP policy contains the following rules:
Support of non-default vSystems for this feature depends on the device model. This feature is available on the Web interface only if it is supported.
Support of non-default contexts for this feature depends on the device model. This feature is available on the Web interface only if it is supported.
Deleting a resource in the resource management page might cause the cascade deletion as follows:
Deleting a regular expression will also delete all match conditions of detection rules that use the selected regular expression and might delete a DLP policy if no match conditions of detection rules exist in the DLP policy.
Deleting an email server will also delete all actions that apply to the selected email server and might delete a response rule if no actions exist in the response rule.
Deleting a file server simultaneously deletes all actions that apply to the selected file server and might delete a response rule if no actions exist in the response rule.
Configure DLP as shown in Figure-1.
Figure-1 DLP configuration procedure
Complete the following tasks before you configure this feature:
Assign IP addresses to interfaces on the
Configure routes on the
Create security zones on the
Add interfaces to security zones. You can add interfaces to a security zone on the
Configure security policies to permit the target traffic on the
Configure a DLP policy, and then configure detection rules, identity rules, and response rules in the policy according to actual network security requirements.
Click the
In the navigation pane, select
Click
Figure-2 Clicking Create
Figure-3 Creating a DLP policy
Configure parameters for the DLP policy.
Table-1 DLP policy configuration items
Item | Description |
Policy name | Enter the name of the DLP policy. The name is case sensitive and valid characters include Chinese characters, letters, digits, underscores (_), and hyphens (-). |
Description | Enter a description for the DLP policy. |
Scan mode | Select a scan mode:
|
Start policy | Select whether to start the DLP policy. |
Click the
Click
Click
If the data matches an exceptional rule, the data does not match any detection rule. You can configure multiple detection rules and exceptional rules in a DLP policy.
Figure-4 Clicking Create
Figure-5 Creating a rule
Table-2 Detection rule configuration items
Item | Description |
Name | Enter the name of a detection rule. The name is case sensitive and valid characters include Chinese characters, letters, digits, underscores (_), and hyphens (-). |
Severity level | Select the severity level of an event matching the detection rule:
|
Click
Configure the match condition parameters.
Figure-6 Clicking Create
Figure-7 Creating a match condition
Table-3 Match condition configuration items
Item | Description |
Match type | Select a match type for the detection rule:
|
Occurrence count method | Select an occurrence count method:
This field is available only when the match type is set to |
Counting scope | Select a counting scope:
This field is available only when the match type is set to |
Regular expression | Enter a regular expression. This field is available only when the match type is set to |
Case sensitive | Select whether the keyword for matching is case sensitive. This field is available only when the match type is set to |
Keyword | Select a criterion for keyword matching:
This field is available only when the match type is set to |
Match whole word only | Select whether to match whole word only. This field is available only when the match type is set to |
Fingerprint file | Select a fingerprint file for matching. This field is available only when the match type is set to |
Threshold | Enter a matching threshold with the sample file contents. This field is available only when the match type is set to |
File type | Select a file type for matching. This field is available only when the match type is set to |
File name | Enter a file name. This field is available only when the match type is set to |
Maximum | Enter the maximum file size. This field is available only when the match type is set to If both the maximum file size and the minimum file size are set to 0, the file size is not limited. |
Minimum | Enter the minimum file size. This field is available only when the match type is set to If both the maximum file size and the minimum file size are set to 0, the file size is not limited. |
Protocol | Select a protocol for matching. This field is available only when the match type is set to |
Click
Click the
Click
Click
If the data matches an exceptional rule, the data does not match any identity rule. You can configure multiple identity rules and exceptional rules in a DLP policy.
Figure-8 Clicking Create
Figure-9 Creating an identity rule
Table-4 Identity rule configuration items
Item | Description |
Name | Enter the name of an identity rule. The name is case sensitive and valid characters include Chinese characters, letters, digits, underscores (_), and hyphens (-). |
Severity level | Select the severity level of an event matching the identity rule:
|
Click
Configure the match condition parameters.
Figure-10 Clicking Create
Figure-11 Creating a match condition
Table-5 Match condition configuration items
Item | Description |
Match type | Select a match type for the identity rule:
|
Email addresses | Enter email addresses for matching. |
Recipient type | Select a recipient type:
This field is available only when the match type is set to |
Threshold | Enter a matching threshold with the email addresses. This field is available only when the recipient type is set to |
IP version | Select an IP version:
|
IP addresses | Enter IP addresses for matching. |
User | Select or enter users for matching. |
Host names | Enter host names for matching. This field is available only when the match type is set to |
Click
Click the
Create or select a response rule. You can configure multiple response rules for a DLP policy.
Figure-12 Response rule
Click
The global parameters apply to all DLP policies.
Click the
In the navigation pane, select
On the
Figure-13 Configuring internal IP addresses
Click
Click the
Configure the monitoring direction parameters.
Figure-14 Configuring monitoring direction parameters
Table-6 Monitoring direction configuration items
Item | Description |
Monitoring direction | Select a monitoring direction:
|
Click
Click the
Figure-15
Click
Click the
In the navigation pane, select
On the
Configure the fingerprint file resource parameters.
Figure-16 Clicking Create
Figure-17 Creating a fingerprint file resource
Table-7 Fingerprint file resource configuration items
Item | Description |
Name | Enter the name of the fingerprint file resource. |
Fingerprint file | Import a fingerprint file. |
Click
Click the
In the navigation pane, select
On the
Configure the regular expression parameters.
Figure-18 Clicking Create
Figure-19 Creating a regular expression
Table-8 Regular expression configuration items
Item | Description |
Name | Enter the name of the regular expression. |
Regular expression | Enter a regular expression. |
Click
Figure-20 Created regular expression
Click the
In the navigation pane, select
On the
Configure the email alarm template parameters.
Figure-21 Clicking Create
Figure-22 Creating an email alarm template
Table-9 Email alarm template configuration items
Item | Description |
Name | Enter the name of the email alarm template. |
Email server | Enter an email server for sending emails. |
Recipients | Enter the recipient email addresses. |
Cc recipients | Enter the recipient email addresses for carbon copy. |
Bcc recipients | Enter the recipient email addresses for blind carbon copy. |
Theme | Enter the theme of alarm emails. |
Body | Enter the contents of alarm emails. |
Click
Figure-23 Created email alarm template
Click the
In the navigation pane, select
On the
Configure the email server parameters.
Figure-24 Clicking Create
Figure-25 Creating an email server
Table-10 Email server configuration items
Item | Description |
Name | Enter the name of the email server. |
Server address | Enter the IP address or host name of the email server. |
Encrypted | Select whether to encrypt the interaction with the email server. |
Authenticated | Select whether authentication is required for accessing the email server. |
Username | Enter the username for accessing the email server. |
Password | Enter the password for accessing the email server. |
Sender | Enter the email address of the email server for sending emails. |
Click
Figure-26 Created email server
Click the
In the navigation pane, select
On the
Configure the file server parameters.
Figure-27 Clicking Create
Figure-28 Creating a file server
Table-11 File server configuration items
Item | Description |
Name | Enter the name of the file server. |
Type | Select a file server type:
|
Path | Enter a file storage path, for example, This field is available only when the file server type is FTP. |
Username | Enter the username for accessing the FTP server. This field is available only when the file server type is FTP. |
Password | Enter the password for accessing the FTP server. This field is available only when the file server type is FTP. |
Click
Figure-29 Created file server
Click the
In the navigation pane, select
On the
Configure the response rule parameters.
Figure-30 Clicking Create
Figure-31 Creating a response rule
Table-12 Response rule configuration items
Item | Description |
Name | Enter the name of the response rule. The name is case sensitive and valid characters include Chinese characters, letters, digits, underscores (_), and hyphens (-). |
Description | Enter a description for the response rule. |
Click
Figure-32 Clicking Create
Figure-33 Creating a match condition
Table-13 Match condition configuration items
Item | Description |
Match type | Select a match type for the response rule:
|
Operator type | Select an operator type:
|
Type value | Select a type value. The type value varies by the selected match type. |
Click
Click
Figure-34 Clicking Create
Figure-35 Creating an action
Table-14 Action configuration items
Item | Description |
Action type | Select an action type for the response rule:
|
File server | Select a file server name. This filed is available only when the action type is set to |
Comments | Enter the comments for suspicious data transmission. This filed is available only when the action type is set to |
Email alarm template | Select an email alarm template. This filed is available only when the action type is set to |
Click
Click
Figure-36 Created a response rule