beautypg.com

Security policy configuration, Overview, Configuration tasks – H3C Technologies H3C SecBlade SSL VPN Cards User Manual

Page 73: Creating a security policy

background image

65

Security Policy Configuration

Overview

Insecure terminal access to the internal network may lead to information leakage. Using the host

checking plug-in program, the system can check the operating system version, browser version,
processes, files and security software of the terminal and then determine which resources the terminal

can use.
A security policy specifies the method for evaluating the security of user terminals. It defines the items to

be checked. A security policy can define multiple categories of items to be checked, with each category
containing multiple items. If a terminal satisfies any item of a category, it is considered that the terminal

satisfies the category. Only when a terminal satisfies all the categories, does the terminal satisfy the

security policy.

Configuration Tasks

Select Domain > Security Policy from the navigation tree to enter the security policy management page,

as shown in

Figure 49

.

Figure 49 Security policy management page

Perform these security policy configuration tasks.

Creating a Security Policy

Configuring Security Policy Resources

Modifying a Security Policy

Creating a Security Policy

Click Add to create a security policy in the page shown in

Figure 50

.