EasyManua.ls Logo

Huawei AR1200-S - Page 11

Huawei AR1200-S
308 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
9.4.1 Establishing the Configuration Task.....................................................................................................172
9.4.2 Creating an Attack Defense Policy........................................................................................................173
9.4.3 (Optional) Configuring a Blacklist........................................................................................................174
9.4.4 (Optional) Configuring the Rate Limit for Packets Sent to the CPU....................................................174
9.4.5 (Optional) Setting the Priority of Protocol Packets...............................................................................175
9.4.6 (Optional) Configuring the Rate Limit for All Packets Sent to the CPU..............................................175
9.4.7 (Optional) Configuring the Rate Limit for Packets After ALP Is Enabled...........................................176
9.4.8 Applying the Attack Defense Policy.....................................................................................................177
9.4.9 Checking the Configuration...................................................................................................................177
9.5 Maintaining the Attack Defense Policy..........................................................................................................178
9.5.1 Clearing Statistics on Packets Sent to the CPU.....................................................................................178
9.5.2 Clearing Attack Source Information......................................................................................................178
9.6 Configuration Examples.................................................................................................................................178
9.6.1 Example for Configuring an Attack Defense Policy.............................................................................178
10 ACL Configuration..................................................................................................................184
10.1 ACL Overview.............................................................................................................................................185
10.2 ACL Features Supported by the AR1200-S.................................................................................................185
10.3 Configuring a Basic ACL.............................................................................................................................188
10.3.1 Establishing the Configuration Task...................................................................................................188
10.3.2 (Optional) Creating a Time Range for a Basic ACL...........................................................................189
10.3.3 Creating a Basic ACL..........................................................................................................................189
10.3.4 Configuring a Basic ACL Rule...........................................................................................................191
10.3.5 Applying a Basic ACL........................................................................................................................192
10.3.6 Checking the Configuration.................................................................................................................194
10.4 Configuring an Advanced ACL....................................................................................................................194
10.4.1 Establishing the Configuration Task...................................................................................................195
10.4.2 (Optional) Creating a Time Range for an Advanced ACL..................................................................196
10.4.3 Creating an Advanced ACL................................................................................................................197
10.4.4 Configuring an Advanced ACL Rule..................................................................................................198
10.4.5 Applying an Advanced ACL...............................................................................................................200
10.4.6 Checking the Configuration.................................................................................................................201
10.5 Configuring a Layer 2 ACL..........................................................................................................................202
10.5.1 Establishing the Configuration Task...................................................................................................202
10.5.2 (Optional) Creating a Time Range for a Layer 2 ACL........................................................................203
10.5.3 Creating a Layer 2 ACL......................................................................................................................204
10.5.4 Configuring a Layer 2 ACL Rule........................................................................................................205
10.5.5 Applying a Layer 2 ACL.....................................................................................................................206
10.5.6 Checking the Configuration.................................................................................................................207
10.6 Configuration Examples...............................................................................................................................208
10.6.1 Example for Configuring a Basic ACL to Limit Access to the FTP Server........................................208
10.6.2 Example for Using Advanced ACLs to Configure the Firewall Function..........................................210
10.6.3 Example for Using a Layer 2 ACL to Configure Traffic Classification.............................................214
Huawei AR1200-S Series Enterprise Routers
Configuration Guide - Security Contents
Issue 02 (2012-03-30) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
x

Table of Contents

Related product manuals