iii
Setting rate limiting ············································································································································· 126
Wireless QoS configuration example ························································································································ 127
CAC service configuration example ················································································································· 127
Static rate limiting configuration example ········································································································ 129
Dynamic rate limiting configuration example ·································································································· 130
Configuring advanced settings ······························································································································ 132
Setting a district code ·················································································································································· 132
Channel busy test ························································································································································· 132
Managing a 3G modem ········································································································································ 134
Displaying 3G modem information ···························································································································· 134
Configuring the cellular interface ······························································································································· 137
Managing the PIN ······················································································································································· 138
Rebooting the 3G modem ··········································································································································· 138
Configuring NAT ····················································································································································· 140
Overview ······································································································································································· 140
Recommended configuration procedure···················································································································· 140
Configuring dynamic NAT ·········································································································································· 140
Configuring a DMZ host ············································································································································· 142
Creating a DMZ host ·········································································································································· 142
Enabling DMZ host on an interface ·················································································································· 142
Configuring an internal server ···································································································································· 143
Enabling application layer protocol check ················································································································ 145
Configuring connection limit ······································································································································· 145
NAT configuration examples ······································································································································ 146
Internal hosts accessing public network configuration example ···································································· 146
Internal server configuration example ··············································································································· 148
Configuring access control ····································································································································· 152
Configuration procedure ············································································································································· 152
Access control configuration example ······················································································································· 153
Configuring URL filtering········································································································································· 155
Configuration procedure ············································································································································· 155
URL filtering configuration example ··························································································································· 156
Configuring attack protection ································································································································· 158
Overview ······································································································································································· 158
Blacklist function ·················································································································································· 158
Intrusion detection function ································································································································· 158
Configuring the blacklist function ······························································································································· 160
Recommended configuration procedure ··········································································································· 160
Enabling the blacklist function ··························································································································· 161
Adding a blacklist entry manually ····················································································································· 161
Viewing blacklist entries ····································································································································· 162
Configuring intrusion detection ·································································································································· 162
Attack protection configuration examples ················································································································· 164
Attack protection configuration example for MSR900/20-1X ······································································· 164
For MSR20/30/50/93X/1000 routers ··········································································································· 167
Configuring application control ····························································································································· 171
Recommended configuration procedure···················································································································· 171
Loading applications ··········································································································································· 171
Configuring a custom application ····················································································································· 172
Enabling application control ······························································································································ 173