Platform Help >> Terminal Access Management >> Unauthorized Access Processing Policy

Illegal Access Processing Policy

Unauthorized access processing policies include:

Operation Procedure

  1.  Click the Resource tab, and then click Access Configuration from the navigation tree to enter the access configuration management page.
  2. Click the Unauthorized Access Processing Policy link to enter the unauthorized access processing policy page.
  3. Specify relevant parameters.
  4. Click OK.

Precautions

  1. When some devices in the network are not added to the system, the learned access interface of the endpoint may not be the interface directly connected to the endpoint. Shutting down the interface might lead to a large area of disconnection.