H3C Technologies H3C SecBlade IPS Cards User Manual
Page 7
ii
Undo Form of a Command··············································································································5-6
Editing Functions ·····························································································································5-7
CLI Output ·······································································································································5-7
Command History Functions ···········································································································5-8
6 Encrypted P2P Traffic Identification Configuration ···············································································6-1
Introduction to Encrypted P2P Traffic Identification················································································6-1
Configuring Encrypted P2P Traffic Identification ····················································································6-1
Configuring Encrypted P2P Traffic Identification·············································································6-1
Displaying and Maintaining Encrypted P2P Traffic Identification····················································6-2
7 Index ···························································································································································7-1