EasyManua.ls Logo

Alcatel-Lucent OmniAccess 5740 - Example 2: Simple Zone Configuration in Omniaccess 5740 USG

Alcatel-Lucent OmniAccess 5740
1225 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Zone Configuration
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
781
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
14. Configuring the firewall policy to protect against the DoS attack.
ALU(config)#firewall
ALU(config-firewall)# policy prevent
ALU(config-firewall-prevent)# match any DoS attack atk1 drop
Applying this firewall policy to the trust and DMZ as an IN policy to protect the
network against the DoS attacks.
ALU(config-if Serial0/0:0)#firewall policy in prevent
EXAMPLE 2: SIMPLE ZONE CONFIGURATION IN OMNIACCESS 5740 USG
In OmniAccess 5740 USG, you can define classification for trusted/
untrusted/DMZ traffic in ACL, NAT, or DoS policies, and further apply these
policies to the interfaces:
match-list trusted
ip 10.0.0.0/24 any
match-list dmz
ip 172.16.0.0/24 any
match-list any-ip
ip any any
ip nat nat-policy
match trusted source-nat
ip filter permit-dmz-policy
match dmz permit
ip filter deny-untrusted-policy
match any-ip deny
Suppose GigabitEthernet 3/1 is facing external networks, you will need to
apply these NAT and Filter policies to this interface:
interface GigabitEthernet3/1 //Physical interface to untrusted
networks
ip nat out nat-policy //This will NAT internal traffic
ip filter out permit-dmz-policy //This will permit DMZ traffic without
translation
ip filter in deny-untrusted-policy //This will deny all untrusted
traffic originated from outside.

Table of Contents

Other manuals for Alcatel-Lucent OmniAccess 5740

Related product manuals