beautypg.com

H3C Technologies H3C SecBlade IPS Cards User Manual

Page 7

background image

ii

Undo Form of a Command··············································································································5-6
Editing Functions ·····························································································································5-7
CLI Output ·····················································································································
··················5-7
Command History Functions ···········································································································5-8

6 Encrypted P2P Traffic Identification Configuration ···············································································6-1

Introduction to Encrypted P2P Traffic Identification················································································6-1
Configuring Encrypted P2P Traffic Identification ···············································································
·····6-1

Configuring Encrypted P2P Traffic Identification·············································································6-1
Displaying and Maintaining Encrypted P2P Traffic Identification····················································6-2

7 Index ···························································································································································7-1