beautypg.com
i
Contents
Security overview ························································································································································· 1
Network security threats ··················································································································································· 1
Network security services ················································································································································· 1
Network security technologies ········································································································································· 1
Identity authentication ·············································································································································· 1
Data security ····························································································································································· 2
Firewall and connection control ······························································································································ 2
Attack detection and protection ······························································································································ 3
Other security technologies ····································································································································· 3
Configuring security zones ·········································································································································· 5
Overview ············································································································································································ 5
Basic concepts ·························································································································································· 5
Zone-based security policy application example ·································································································· 5
Configuring a security zone in the Web interface ········································································································ 6
Recommended configuration procedure ················································································································ 6
Creating a security zone ········································································································································· 6
Adding members to the security zone ···················································································································· 7
Security zone configuration example ····················································································································· 9
Configuring a security zone at the CLI ························································································································ 12
Security zone configuration task list ···················································································································· 12
Configuring a security zone ································································································································· 12
Configuring a time range ·········································································································································· 16
Configuring a time range in the Web interface ········································································································· 16
Configuring a time range at the CLI ···························································································································· 17
Configuring ACLs ······················································································································································· 18
Overview ········································································································································································· 18
ACL categories ······················································································································································ 18
Numbering and naming ACLs ····························································································································· 18
Match order ··························································································································································· 18
Rule comments and rule range remarks ·············································································································· 19
Rule numbering ······················································································································································ 20
Implementing time-based ACL rules ····················································································································· 20
Configuration guidelines ··············································································································································· 20
Configuring ACLs in the Web interface ······················································································································ 21
Recommended configuration procedure ············································································································· 21
Creating an ACL ···················································································································································· 21
Configuring a basic ACL rule ······························································································································ 22
Configuring an advance ACL rule ······················································································································· 23
Configuring an Ethernet frame header ACL rule ······························································································· 26
Configuring ACL acceleration ······························································································································ 27
ACL configuration example ·································································································································· 27
Configuring ACLs at the CLI ·········································································································································· 28
Configuration task list ··········································································································································· 28
Configuring a basic ACL ······································································································································ 28
Configuring an advanced ACL ···························································································································· 29
Configuring an Ethernet frame header ACL ······································································································· 31
Copying an ACL ···················································································································································· 32