Huawei quidway s7700 Configuration Manual page 7

Smart routing switch
Hide thumbs Also See for quidway s7700:
Table of Contents

Advertisement

Quidway S7700 Smart Routing Switch
Configuration Guide - SPU
2.5.3 Adding IP Addresses to the Blacklist Manually......................................................................................40
2.5.4 Configuring Blacklist and Whitelist by Using the Configuration File....................................................41
2.5.5 Checking the Configuration.....................................................................................................................42
2.6 Configuring the Whitelist.................................................................................................................................42
2.6.1 Establishing the Configuration Task.......................................................................................................42
2.6.2 Adding Entries to the Whitelist Manually...............................................................................................43
2.6.3 Configuring Blacklist and Whitelist by Using the Configuration File....................................................43
2.6.4 Checking the Configuration.....................................................................................................................45
2.7 Configuring ASPF............................................................................................................................................45
2.7.1 Establishing the Configuration Task.......................................................................................................45
2.7.2 Configuring ASPF Detection...................................................................................................................46
2.7.3 Checking the Configuration.....................................................................................................................46
2.8 Configuring Port Mapping................................................................................................................................47
2.8.1 Establishing the Configuration Task.......................................................................................................47
2.8.2 Configuring Port Mapping.......................................................................................................................48
2.8.3 Checking the Configuration.....................................................................................................................48
2.9 Configuring the Aging Time of the Firewall Session Table............................................................................49
2.9.1 Establishing the Configuration Task.......................................................................................................49
2.9.2 Configuring the Aging Time of the Firewall Session Table...................................................................49
2.9.3 Checking the Configuration.....................................................................................................................50
2.10 Configuring the Transparent Firewall............................................................................................................50
2.10.1 Establishing the Configuration Task.....................................................................................................51
2.10.2 Configuring the Transparent Firewall...................................................................................................51
2.10.3 Checking the Configuration...................................................................................................................53
2.11 Configuring the Attack Defense Function......................................................................................................53
2.11.1 Establishing the Configuration Task.....................................................................................................54
2.11.2 Enabling the Attack Defense Function..................................................................................................54
2.11.3 Setting the Parameters of Flood Attack Defense...................................................................................56
2.11.4 Configuring Large ICMP Packet Attack Defense.................................................................................57
2.11.5 Setting Parameters of Scanning Attack Defense...................................................................................58
2.11.6 Checking the Configuration...................................................................................................................58
2.12 Configuring Traffic Statistics and Monitoring...............................................................................................59
2.12.1 Establishing the Configuration Task.....................................................................................................59
2.12.2 Enabling Traffic Statistics and Monitoring...........................................................................................60
2.12.3 Setting the Session Thresholds..............................................................................................................61
2.12.4 Checking the Configuration...................................................................................................................63
2.13 Configuring the Log Function........................................................................................................................63
2.13.1 Establishing the Configuration Task.....................................................................................................63
2.13.2 Enabling the Log Function on the Firewall...........................................................................................64
2.13.3 Setting the Parameters of Logs..............................................................................................................65
2.13.4 Checking the Configuration...................................................................................................................66
2.14 Maintaining the Firewall................................................................................................................................66
Issue 01 (2011-07-15)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
vi

Advertisement

Table of Contents
loading

Table of Contents