beautypg.com

H3C Technologies H3C SecBlade LB Cards User Manual

Page 6

background image

i

Contents

Security overview ························································································································································· 1

 

Network security threats ··················································································································································· 1

 

Network security services ················································································································································· 1

 

Network security technologies ········································································································································· 1

 

Identity authentication ·············································································································································· 1

 

Data security ····························································································································································· 2

 

Firewall and connection control ······························································································································ 2

 

Attack detection and protection ······························································································································ 3

 

Other security technologies ····································································································································· 3

 

Configuring security zones ·········································································································································· 5

 

Overview ············································································································································································ 5

 

Basic concepts ·························································································································································· 5

 

Zone-based security policy application example ·································································································· 5

 

Configuring a security zone in the Web interface ········································································································ 6

 

Recommended configuration procedure ················································································································ 6

 

Creating a security zone ········································································································································· 6

 

Adding members to the security zone ···················································································································· 7

 

Security zone configuration example ····················································································································· 9

 

Configuring a security zone at the CLI ························································································································ 12

 

Security zone configuration task list ···················································································································· 12

 

Configuring a security zone ································································································································· 12

 

Configuring a time range ·········································································································································· 16

 

Configuring a time range in the Web interface ········································································································· 16

 

Configuring a time range at the CLI ···························································································································· 17

 

Configuring ACLs ······················································································································································· 18

 

Overview ········································································································································································· 18

 

ACL categories ······················································································································································ 18

 

Numbering and naming ACLs ····························································································································· 18

 

Match order ··························································································································································· 18

 

Rule comments and rule range remarks ·············································································································· 19

 

Rule numbering ······················································································································································ 20

 

Implementing time-based ACL rules ····················································································································· 20

 

Configuration guidelines ··············································································································································· 20

 

Configuring ACLs in the Web interface ······················································································································ 21

 

Recommended configuration procedure ············································································································· 21

 

Creating an ACL ···················································································································································· 21

 

Configuring a basic ACL rule ······························································································································ 22

 

Configuring an advance ACL rule ······················································································································· 23

 

Configuring an Ethernet frame header ACL rule ······························································································· 26

 

Configuring ACL acceleration ······························································································································ 27

 

ACL configuration example ·································································································································· 27

 

Configuring ACLs at the CLI ·········································································································································· 28

 

Configuration task list ··········································································································································· 28

 

Configuring a basic ACL ······································································································································ 28

 

Configuring an advanced ACL ···························································································································· 29

 

Configuring an Ethernet frame header ACL ······································································································· 31

 

Copying an ACL ···················································································································································· 32

 

This manual is related to the following products: