Policy tuning based on redundancy analysis results.Īnalysis of policy change impacts on application services based on simulation results before policy changes.
Network topology awareness and service chain-based traffic diversion policy delivery.Īutomatic delivery of security policies based on network partitions, application mutual access relationships, security services, and VPCs. Receives threat handling requests from the big data security analysis system and sends them to threat blocking devices. Security policy, Virtual Private Cloud (VPC) policy, security service, and task deployment. Resource pool adding, deletion, modification, and query.Īddress, service, application, and network partition management. Device discovery, device management, virtual system management, configuration consistency check, and device Single Sign-On (SSO).