beautypg.com

H3C Technologies H3C SR6600 User Manual

Page 13

background image

2-10

Feature

Operation and command

manual

Feature description

ALG

ALG Configuration
ALG Commands

The application level gateway (ALG) feature is
used to process application layer packets.

PKI

PKI Configuration
PKI Commands

Public key infrastructure (PKI) is a system
which uses public key technology and digital
certificate to protect system security and
authenticate digital certificate users.

z

Generating an RSA pair for PKI

z

Configuring PKI certificate registration

z

Submitting a PKI certificate request

z

Configuring PKI certificate validation

z

Configuring access control policy of
certificate attribute

Session
Management

Session Management
Configuration
Session Management
Commands

The session management feature is a common
feature designed to implement session-based
services such as network address translation
(NAT), application specific packet filter (ASPF),
and intrusion protection.

z

Session management configuration

z

Specifying the permanent session ACL

NAT

NAT Configuration
NAT Commands

Network Address Translation (NAT) is to
translate the IP address in IP data packet
header into another IP address, which is mainly
used to implement private network accessing
external network in practice.

z

Configuring EASY IP

z

Configuring static NAT

z

Configuring many-to-many NAT

z

Configuring many-to-one NAPT

z

Configuring internal server

z

Configuring NAT Log

z

Configuring connection limit

ACL

ACL Configuration
ACL Commands

Access Control List, used to implement flow
identification. Flow template is not supported.

z

Configuring effective period of an
IPv4 ACL

z

Basic IPv4 ACL configuration

z

Advanced IPv4 ACL configuration

z

Basic IPv6 ACL configuration

z

Advanced IPv6 ACL configuration

IPsec

IPsec Configuration
IPsec Commands

Layer 3 tunnel encryption protocol defined by
IETF, which provides security for IP data
packets transmitted on the Internet.

z

Configuring an IPsec proposal

z

Configuring an IPsec policy

z

Configuring an IPsec policy template

z

Applying an IPsec policy

z

Configuring an IKE proposal

z

Configuring an IKE peer

z

Configuring IKE keepalive timer