No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


eSight V300R010C00SPC200, 300, and 500 Operation Guide 09

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Compliance Check Introduction

Compliance Check Introduction

This section describes the definition, functions, application restrictions, and key indicators of compliance check.


Through compliance check, you can quickly check whether device configurations are correct or changed.


Compliance check can detect noncompliance of devices according to the compliance rules. You can perform compliance check to determine whether an enterprise network meets the security requirements and keep the network running in a secure and stable environment.

Compliance check process: The network administrator formulates compliance rules for each device based on the security configuration requirements and imports the rules when creating a compliance check task. After the task is executed manually or automatically, the network administrator can view and analyze the result and rectify configuration to ensure that the device conforms to the compliance rules.

Task Management

All the compliance rules are managed in the compliance check task, which specifies the configurations and devices to be checked.

Compliance check task management provides the following functions:

  • Creating, deleting, modifying, and querying tasks as well as enabling and disabling periodic tasks
    Figure 12-51 Compliance check task management
    Figure 12-52 Creating a check task
  • Immediately auditing tasks and rules
  • Viewing task details and identifying devices that do not conform to the compliance rules

Application Restrictions

  • Since command lines and their outputs are directly displayed on the foreground, do not use command lines that query or carry sensitive information.
  • Compliance check allows users to set rules to check whether device configurations meet the expectation. To modify and deliver configurations, use other tools (for example, the intelligent configuration tool).
  • Audit rules obtain device configurations through command lines for check. Do not deliver commands that may modify device configurations to devices. Otherwise, service risks exist.
  • Disable the device function to record logs to the console. If you enable the function, the audit result may be abnormal.
  • It is recommended that one task contain no more than 1000 rules. Too many rules may cause the page to stop responding.



Updated: 2019-09-12

Document ID: EDOC1100044378

Views: 82974

Downloads: 403

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next