beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 7

background image

ii

Enabling TCP proxy for a security zone ············································································································· 34

 

Adding a protected IP address entry ··················································································································· 34

 

Displaying information about protected IP address entries ·············································································· 35

 

TCP proxy configuration example ································································································································ 36

 

Network requirements ··········································································································································· 36

 

Configuration procedure ······································································································································ 36

 

Configuration guidelines ··············································································································································· 38

 

Configuring IDS collaboration ·································································································································· 39

 

Feature and hardware compatibility ···························································································································· 39

 

Overview ········································································································································································· 39

 

Enabling IDS collaboration ··········································································································································· 39

 

Configuration guidelines ··············································································································································· 40

 

Displaying intrusion detection statistics ···················································································································· 41

 

Overview ········································································································································································· 41

 

Configuration procedure ··············································································································································· 41

 

Configuring ARP attack protection ···························································································································· 44

 

Configuring periodic sending of gratuitous ARP packet ···························································································· 44

 

Introduction ···························································································································································· 44

 

Configuring periodic sending of gratuitous ARP packet in the web interface ················································ 45

 

Configuring periodic sending of gratuitous ARP packet at the CLI ·································································· 46

 

Configuring ARP automatic scanning and fixed ARP ································································································· 47

 

Introduction ···························································································································································· 47

 

Configuring ARP automatic scanning in the web interface ·············································································· 47

 

Configuring fixed ARP in the web interface ······································································································· 49

 

Configuring ARP automatic scanning and fixed ARP at the CLI ······································································· 49

 

Configuring TCP attack protection ···························································································································· 51

 

Overview ········································································································································································· 51

 

Enabling the SYN Cookie feature ································································································································ 51

 

Enabling protection against Naptha attacks ··············································································································· 52

 

Displaying and maintaining TCP attack protection ···································································································· 52

 

Configuring firewall ··················································································································································· 53

 

Overview ········································································································································································· 53

 

Configuring a packet-filter firewall ······························································································································· 53

 

Packet-filter firewall configuration task list ·········································································································· 53

 

Enabling the IPv6 firewall function ······················································································································ 54

 

Configuring the default filtering action of the IPv6 firewall ·············································································· 54

 

Configuring IPv6 packet filtering on an interface ······························································································ 54

 

Displaying and maintaining a packet-filter firewall ··························································································· 55

 

Configuring content filtering ······································································································································ 56

 

Overview ········································································································································································· 56

 

HTTP packet content filtering ································································································································ 56

 

SMTP packet content filtering ······························································································································· 57

 

POP3 packet content filtering ······························································································································· 57

 

FTP packet content filtering ··································································································································· 57

 

Telnet packet content filtering······························································································································· 58

 

Configuring content filtering ········································································································································· 58

 

Configuration guide ·············································································································································· 58

 

Configuring keyword filtering entries ·················································································································· 61

 

Configuring URL hostname filtering entries ········································································································· 62

 

Configuring filename filtering entries ·················································································································· 63

 

Configuring email address filtering entries ········································································································· 64