Components of the security policy on the USG6000 series

5

A security policy consists of matching conditions and actions.

Other related questions:
Components of the security policy on the USG9000 series
A security policy consists of matching conditions and actions.

Components of the security policy on the USG2000 and USG5000 series
A security policy consists of matching conditions and actions.

Components in the content security component package on the USG6000
The content security component package contains the following functions: File blocking File blocking profile blocks the transmission of specified types of files to prevent downloads of files infected by malware and viruses or uploads of sensitive files to the Internet. Data filtering Data filtering prevents sensitive information leaks. Mail filtering Mail filtering controls email sending and receiving to prevent spam, anonymous mails, and data leaks. Application behavior control Application behavior control implements refined control over HTTP- and FTP-based behavior. Audit policy The audit policy and audit profile are used to record the Internet access behavior for future audit and analysis. Proxy policy The proxy policy is used to decrypt SSL traffic for content security detection and audit. Smart DNS Smart DNS is used to provide different server IP addresses for different ISP users so that the ISP users can access intranet services using their own ISP networks. By doing as, smart DNS ensures minimized delay and optimal service experience.

Security policy matching order on the USG6000 series
When multiple security policies are to be matched, they are matched in a specific order. Therefore, you are advised to configure more fine-grained security policies first.

Enabling security policies on the USG6000
The operation for enabling the security policy on the USG6000 is as follows: Search for the following content in USG6000 Product Documentation:-For security policy configuration through the web UI, see Security Policy and Content Security > Configuring a Security Policy Using the Web UI. -For security policy configuration through the CLI, see Security Policy and Content Security > Configuring a Security Policy Using the.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top