Configuring the Static Routing ........................................................................................................................................................74
Configuring the Policy Routing .......................................................................................................................................................75
Viewing the Routing Table .................................................................................................................................................................76
Configuration Examples ................................................................................................................................................. 77
Example for Configuring NAT ..........................................................................................................................................................77
Network Requirements ..........................................................................................................................................................77
Network Topology ....................................................................................................................................................................77
Configuration Scheme ...........................................................................................................................................................77
Configuration Procedure ......................................................................................................................................................78
Example for Configuring Load Balancing ..................................................................................................................................80
Network Requirements ..........................................................................................................................................................80
Network Topology ....................................................................................................................................................................80
Configuration Scheme ...........................................................................................................................................................80
Configuration Procedure ......................................................................................................................................................81
Example for Configuring Virtual Server ......................................................................................................................................81
Network Requirements ..........................................................................................................................................................81
Network Topology ....................................................................................................................................................................82
Configuration Scheme ...........................................................................................................................................................82
Configuration Procedure ......................................................................................................................................................82
Example for Configuring Policy Routing ....................................................................................................................................83
Network Requirements ..........................................................................................................................................................83
Network Topology ....................................................................................................................................................................83
Configuration Scheme ...........................................................................................................................................................83
Configuration Procedure ......................................................................................................................................................83
Configuring Firewall ..........................................................................................................86
Firewall .................................................................................................................................................................................. 87
Overview ......................................................................................................................................................................................................87
Supported Features ..............................................................................................................................................................................87
Firewall Configuration ..................................................................................................................................................... 89
Anti ARP Spoofing ..................................................................................................................................................................................89
Adding IP-MAC Binding Entries ........................................................................................................................................89
Enable Anti ARP Spoofing ....................................................................................................................................................92
Configuring Attack Defense .............................................................................................................................................................94
Configuring MAC Filtering ..................................................................................................................................................................96
Configuring Access Control .............................................................................................................................................................97
Configuration Examples ................................................................................................................................................. 99