华赛防火墙配置案例
5安全防备典型配置案例...........................................5-15.1配置ACL.......................5-35.1.1配置ACL举例............................................5-35.2配置NAT........................5-65.2.1校园网中NAT的综合使用.............................5-65.2.2企业网络中NAT的综合使用....................................5-105.2.3配置双向NAT和内部服务器举例..............................5-135.2.4配置内部服务器双出口NAT举例..............................5-155.2.5配置意图NAT举例.................................5-195.3配置虚拟防火墙........................................5-215.3.1配置虚拟防火墙举例.....................................5-215.4配置安全策略............................................5-265.4.1配置会话表老化时刻和长连接举例............................5-265.4.2配置ASPF举例..................................................5-315.4.3配置黑名单举例...........................................................5-345.4.4配置MAC和IP地址绑定举例...................................5-375.4.5配置端口映射举例............................................5-395.5配置攻击防备..................................5-41(5Typical Configuration Cases of Security Prevention .................................5 -15.1 Configuring ACL ...................... 5-35.1.1 Example of configuring ACL ...................... .................................5-35.2 Configuring NAT................................ .................5-65.2.1 Comprehensive Use of NAT in Campus Network ................................5 -65.2.2 Comprehensive Use of NAT in Enterprise Networks .................................5-105.2 .3 Example for Configuring Bidirectional NAT and Internal Server ................................5-135.2.4 Configuring Internal Server Dual Egress NAT Example ...................................... 5-155.2.5 Example for Configuring Intent NAT...................... ................................5-195.3 Configuring the Virtual Firewall ................................ .................................5-215.3.1 Example for configuring a virtual firewall................................. ................5-215.4 Configuring Security Policies ................................. ................................5-265.4.1 Example for configuring session table aging time and long connection ................................ .................5-265.4.2 Example for configuring ASPF................................. .................5-315.4.3 Example of configuring a blacklist ............................................... .................................5-345.4.4 Example for Configuring MAC and IP Address Binding.... .................................5-375.4.5 Example of configuring port mapping.................. .................................5-395.5 Configuring Attack Defense ...................... .................................5-41)
页:
[1]