No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Fat AP and Cloud AP V200R008C00 CLI-based Configuration Guide

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Attack Defense Profile

Attack Defense Profile

As the network develops continuously, there are various types of potential risks such as Trojan horses, worms, and viruses in packets. After an attack defense profile is created, various security functions are available, such as URL filtering, intrusion prevention, and antivirus.

The profile of URL filtering defines actions for URLs matching the blacklist and whitelist to allow or block access to the URLs.

For the detailed configuration, see Configuring URL Filtering Profile.

Before you configure intrusion prevention, update the intrusion prevention signature database or, if necessary, configure user-defined signatures, create intrusion prevention profiles, reference signatures matching the specified conditions in the intrusion prevention profiles, and apply the intrusion prevention profiles in the attack defense profiles.

For the detailed configuration, see Configuring Intrusion Prevention.

The AV function identifies the files transmitted using the specified protocols and processes the virus-infected files based on the predefined response actions to prevent virus-infected files from entering the protected network.

To use the AV function, you must configure an antivirus profile and reference the profile in an attack defense profile.

For the detailed configuration, see Configuring Antivirus.

Updated: 2019-01-11

Document ID: EDOC1000176006

Views: 116410

Downloads: 309

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next