H3c-technologies H3C SecPath F1000-E Manual de usuario Pagina 7

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 99
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 6
ii
Enabling TCP proxy for a security zone ············································································································· 34
Adding a protected IP address entry ··················································································································· 34
Displaying information about protected IP address entries ·············································································· 35
TCP proxy configuration example ································································································································ 36
Network requirements ··········································································································································· 36
Configuration procedure ······································································································································ 36
Configuration guidelines ··············································································································································· 38
Configuring IDS collaboration ·································································································································· 39
Feature and hardware compatibility ···························································································································· 39
Overview ········································································································································································· 39
Enabling IDS collaboration ··········································································································································· 39
Configuration guidelines ··············································································································································· 40
Displaying intrusion detection statistics ···················································································································· 41
Overview ········································································································································································· 41
Configuration procedure ··············································································································································· 41
Configuring ARP attack protection ···························································································································· 44
Configuring periodic sending of gratuitous ARP packet ···························································································· 44
Introduction ···························································································································································· 44
Configuring periodic sending of gratuitous ARP packet in the web interface ················································ 45
Configuring periodic sending of gratuitous ARP packet at the CLI ·································································· 46
Configuring ARP automatic scanning and fixed ARP ································································································· 47
Introduction ···························································································································································· 47
Configuring ARP automatic scanning in the web interface ·············································································· 47
Configuring fixed ARP in the web interface ······································································································· 49
Configuring ARP automatic scanning and fixed ARP at the CLI ······································································· 49
Configuring TCP attack protection ···························································································································· 51
Overview ········································································································································································· 51
Enabling the SYN Cookie feature ································································································································ 51
Enabling protection against Naptha attacks ··············································································································· 52
Displaying and maintaining TCP attack protection ···································································································· 52
Configuring firewall ··················································································································································· 53
Overview ········································································································································································· 53
Configuring a packet-filter firewall ······························································································································· 53
Packet-filter firewall configuration task list ·········································································································· 53
Enabling the IPv6 firewall function ······················································································································ 54
Configuring the default filtering action of the IPv6 firewall ·············································································· 54
Configuring IPv6 packet filtering on an interface ······························································································ 54
Displaying and maintaining a packet-filter firewall ··························································································· 55
Configuring content filtering ······································································································································ 56
Overview ········································································································································································· 56
HTTP packet content filtering ································································································································ 56
SMTP packet content filtering ······························································································································· 57
POP3 packet content filtering ······························································································································· 57
FTP packet content filtering ··································································································································· 57
Telnet packet content filtering······························································································································· 58
Configuring content filtering ········································································································································· 58
Configuration guide ·············································································································································· 58
Configuring keyword filtering entries ·················································································································· 61
Configuring URL hostname filtering entries ········································································································· 62
Configuring filename filtering entries ·················································································································· 63
Configuring email address filtering entries ········································································································· 64
Vista de pagina 6
1 2 3 4 5 6 7 8 9 10 11 12 ... 98 99

Comentarios a estos manuales

Sin comentarios