work security designs require different topology designs, working modes, security zones, and
policy configurations. The basic configurations may include:
l Create security zones, including the link layer (L2) and network layer (L3). Bind different
interfaces to correct security zones respectively.
l Assign IP addresses to interfaces.
l Configure the management functions of the interfaces and create the security policy rules.
l Assign proper network addresses and configure the NAT rules as needed.
l Configure routing of the system to ensure the network connectivity.
l Configure security policy rules between security zones.
l Configure network parameters, such as DHCP and DNS agent, etc.
Notes: For more information on protocols and configurations, see
StoneOS CLI
User Guide
and
StoneOS WebUI User Guide
.
127
Chapter 4 Boot and Configuration