beautypg.com

H3C Technologies H3C SecBlade SSL VPN Cards User Manual

Page 8

background image

iii

Overview ································································································································································ 52

 

Configuration Procedure······································································································································· 52

 

Configuring Bulletin Management ······························································································································· 53

 

Overview ································································································································································ 53

 

Configuration Tasks··············································································································································· 53

 

Adding a Bulletin ··················································································································································· 54

 

Modifying a Bulletin ·············································································································································· 55

 

Authentication Policy Configuration ························································································································· 56

 

Overview ········································································································································································· 56

 

Configuring the Local Authentication Policy ················································································································ 56

 

Overview ································································································································································ 56

 

Configuration Procedure······································································································································· 56

 

Configuring the RADIUS Authentication Policy ··········································································································· 57

 

Overview ································································································································································ 57

 

Configuration procedure ······································································································································ 57

 

Configuring the LDAP Authentication Policy ··············································································································· 60

 

Overview ································································································································································ 60

 

Configuration Procedure······································································································································· 60

 

Configuring the AD Authentication Policy ··················································································································· 62

 

Overview ································································································································································ 62

 

Configuration Procedure······································································································································· 62

 

Configuring the Combination Authentication Policy ·································································································· 63

 

Overview ································································································································································ 63

 

Configuration Procedure······································································································································· 63

 

Security Policy Configuration ···································································································································· 65

 

Overview ········································································································································································· 65

 

Configuration Tasks ······················································································································································· 65

 

Creating a Security Policy ············································································································································· 65

 

Configuring Security Policy Resources ························································································································· 67

 

Modifying a Security Policy ·········································································································································· 68

 

Configuration Examples ············································································································································ 70

 

Overview ········································································································································································· 70

 

Configuring Static Authorization ·································································································································· 70

 

Configuring a User ················································································································································ 70

 

Configure Resources ············································································································································· 70

 

Configure a Resource Group ······························································································································· 70

 

Configure a User Group ······································································································································· 71

 

Configuring Dynamic Authorization ···························································································································· 71

 

Configuring a Security Policy ······························································································································· 71

 

Configuring a Security Policy Resource ·············································································································· 71

 

Enabling Client Security Checking ······················································································································ 71

 

Completing the Configuration ······································································································································ 71

 

Login ················································································································································································ 72

 

Index ··········································································································································································· 73