Search...
Menu

测试企微写的文档是否能兼容helplook

Author: Jojo

1 Implementation Design

1.1 Topology

1.1.1 Current Topology

//Before you start implementation, you need to confirm with customer about topology to figure out some details, including change position, downlink/uplink devices, port links, and address table.

For example

descript

1.1.2 Topology After Implementation

For example

This project focuses on replacing original Broder Router into 2 Sangfor NSF. The expected topology after implementation is as follows.

descript

1.2 Traffic Specification

1.2.1 Current Traffic

For Example

This diagram is simple, since the traffic is clear.

1. Terminals ---> Internet

2. Internet ---> Data Center Server

descript

1.2.2 Endpoint Protection Policy

For Example

According to confirmation with customer, we suggest that below security policies.

lTo All Users: Turn on botnet protection policy in order to cut off the traffic after terminals are infected.

lTo All Users: Turn on "Protection Endpoint" and "Anti-Malware" in IPS policy. Protect against risks caused by vulnerabilities in installed software being exploited or malware being installed.

lTo All Users: Turn on "URL Filter", for filtering illegal web sites.

Share this Article
Previous
Sangfor MCS Management Guide (1)
Next
测试企微编写的4级目录导入效果
Last modified: 2025-03-05Powered by