beautypg.com

H3C Technologies H3C MSR 50 User Manual

Page 13

background image

vii

Configuring ARP attack protection ························································································································· 360

 

Overview ······································································································································································· 360

 

Configuring periodic sending of gratuitous ARP packets ························································································ 360

 

Configuring ARP automatic scanning ························································································································ 361

 

Configuring fixed ARP ················································································································································· 362

 

Configuring IPsec VPN ················································································································································ 1

 

Overview ············································································································································································ 1

 

Recommended configuration procedure························································································································· 1

 

Configuring an IPsec connection ····································································································································· 2

 

Displaying IPsec VPN monitoring information ··············································································································· 8

 

IPsec VPN configuration example ··································································································································· 9

 

Configuration guidelines ··············································································································································· 11

 

Configuring L2TP ························································································································································ 12

 

Enabling L2TP ································································································································································· 13

 

Adding an L2TP group ·················································································································································· 13

 

Displaying L2TP tunnel information ······························································································································ 20

 

Client-initiated VPN configuration example ················································································································ 20

 

Configuring GRE ························································································································································ 25

 

Overview ········································································································································································· 25

 

Configuring a GRE over IPv4 tunnel ···························································································································· 25

 

Recommended configuration procedure ············································································································· 25

 

Creating a GRE tunnel ·········································································································································· 26

 

GRE over IPv4 tunnel configuration example ·············································································································· 27

 

SSL VPN overview ······················································································································································ 34

 

How SSL VPN works ······················································································································································ 34

 

Advantages of SSL VPN ················································································································································ 35

 

Configuring SSL VPN gateway ································································································································· 36

 

Recommended configuration procedure······················································································································ 36

 

Configuring the SSL VPN service ································································································································· 37

 

Configuring Web proxy server resources ··················································································································· 39

 

Configuring TCP application resources ······················································································································· 41

 

Configuring a remote access service resource ··································································································· 42

 

Configuring a desktop sharing service resource ······························································································· 43

 

Configuring an email service resource ··············································································································· 44

 

Configuring a Notes service resource ················································································································· 45

 

Configuring a common TCP service resource ···································································································· 47

 

Configuring IP network resources ································································································································· 48

 

Recommended configuration procedure ············································································································· 48

 

Configuring global parameters ···························································································································· 48

 

Configuring host resources ··································································································································· 49

 

Configuring a user-IP binding ······························································································································ 51

 

Configuring a predefined domain name ············································································································ 52

 

Configuring a resource group ······································································································································ 53

 

Configuring local users ·················································································································································· 55

 

Adding a local user manually ······························································································································ 55

 

Importing local users in bulk ································································································································ 57

 

Configuring a user group ·············································································································································· 58

 

Viewing user information ·············································································································································· 60

 

Viewing online user information ·························································································································· 60

 

Logging out an online user ··································································································································· 60

 

Viewing history user information ························································································································· 60

 

This manual is related to the following products: