User's Manual
6.7.6 OSPF Point-to-point Configuration Example.............................................42
6.8 Configuring IPv6 ...............................................................................................44
6.8.1 Address Configuration ................................................................................44
6.8.2 Routing Configuration ................................................................................44
6.8.3 Ping6 ...........................................................................................................45
Chapter 7 Network Security.....................................................................................46
7.1 Access Control List (ACL) ................................................................................46
7.1.1 Standard ACL..............................................................................................46
7.1.2 Extended ACL.............................................................................................46
7.1.3 Session ACL ...............................................................................................47
7.2 Session ...............................................................................................................47
7.3 Configuring NAT ...............................................................................................48
7.3.1 Configuring SNAT......................................................................................49
7.3.2 Configuring DNAT .....................................................................................50
7.4 Configuring DoS Anti-attack .............................................................................51
7.4.1 System Pre-defined Configuration..............................................................51
7.4.2 Configuring Anti-attack ..............................................................................51
7.5 Configuring Lawful Intercept ............................................................................52
Chapter 8 Configuring HQoS...................................................................................54
8.1 Configuring Rate Limitation on Port .................................................................54
8.2 Configuring Rate Limitation on VLAN.............................................................54
8.3 Configuring Rate Limitation on User ................................................................54
Chapter 9 Configuring AAA.....................................................................................56
9.1 The Attribute of Trust and Untrust.....................................................................56
9.2 User and User Role ............................................................................................56
9.2.1 User.............................................................................................................56
9.2.2 User Role and ACL.....................................................................................57
9.2.3 Access Policy Based on User Role .............................................................57
9.3 Connections among User, VLAN and User Role ..............................................58
9.4 Configuring AAA Profile...................................................................................58
9.4.1 Configuring ACL ........................................................................................58