beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 6

background image

i

Contents

Configuring ACLs ························································································································································· 1

 

Overview ············································································································································································ 1

 

ACL categories ························································································································································· 1

 

ACL numbering and naming ··································································································································· 1

 

Match order ······························································································································································ 2

 

ACL rule numbering ················································································································································· 3

 

Implementing time-based ACL rules ························································································································ 3

 

Fragments filtering with ACLs ·································································································································· 3

 

IPv4 ACL acceleration ·············································································································································· 3

 

Configuring an ACL in the Web interface ····················································································································· 4

 

Configuration task list ·············································································································································· 4

 

Creating an ACL ······················································································································································· 4

 

Configuring a basic ACL rule ································································································································· 5

 

Configuring an advance ACL rule ·························································································································· 7

 

Configuring an Ethernet frame header ACL rule ·································································································· 9

 

Configuring ACL acceleration ······························································································································ 11

 

ACL configuration example ·································································································································· 11

 

Configuring an ACL at the CLI ······································································································································ 15

 

ACL configuration task list ···································································································································· 15

 

Configuring a basic ACL ······································································································································ 16

 

Configuring an advanced ACL ···························································································································· 17

 

Configuring an Ethernet frame header ACL ······································································································· 19

 

Copying an ACL ···················································································································································· 20

 

Enabling ACL acceleration for an IPv4 ACL ······································································································· 20

 

Displaying and maintaining ACLs ······················································································································· 21

 

ACL configuration example ·································································································································· 21

 

Configuring security zones ········································································································································ 24

 

Overview ········································································································································································· 24

 

Zone configuration task list ·································································································································· 25

 

Creating a zone ···················································································································································· 25

 

Configuring a zone member ································································································································ 26

 

Zone configuration example ········································································································································· 28

 

Configuring service management ····························································································································· 33

 

Overview ········································································································································································· 33

 

Configuring service management ································································································································ 34

 

Service management configuration examples ············································································································ 35

 

HTTP configuration example ································································································································ 35

 

HTTPS configuration example ······························································································································ 39

 

Configuring address resources ································································································································· 45

 

Address resource overview ··········································································································································· 45

 

Configuring an address resource ································································································································· 45

 

Configuring a host address resource ·················································································································· 45

 

Configuring an address range resource ············································································································· 46

 

Configuring a subnet address resource ·············································································································· 48

 

Configuring an IP address group resource ········································································································· 49

 

Configuring a MAC address resource ················································································································ 50

 

Configuring a MAC address group resource····································································································· 51