Huawei AR1200-S Configuration Manual page 8

Enterprise routers
Hide thumbs Also See for AR1200-S:
Table of Contents

Advertisement

Huawei AR1200-S Series Enterprise Routers
Configuration Guide - Security
3.10.4 Configuring Large ICMP Packet Attack Defense.................................................................................70
3.10.5 Setting Parameters for Scanning Attack Defense..................................................................................71
3.10.6 Checking the Configuration...................................................................................................................72
3.11 Configuring Traffic Statistics and Monitoring...............................................................................................72
3.11.1 Establishing the Configuration Task.....................................................................................................73
3.11.2 Enabling Traffic Statistics and Monitoring...........................................................................................74
3.11.3 Setting the Session Thresholds..............................................................................................................74
3.11.4 Checking the Configuration...................................................................................................................76
3.12 Configuring the Log Function........................................................................................................................76
3.12.1 Establishing the Configuration Task.....................................................................................................77
3.12.2 Enabling the Log Function on the Firewall...........................................................................................77
3.12.3 Setting the Log Parameters....................................................................................................................78
3.12.4 Checking the Configuration...................................................................................................................79
3.13 Maintaining the Firewall................................................................................................................................79
3.13.1 Displaying the Firewall Configuration..................................................................................................79
3.13.2 Clearing the Firewall Statistics..............................................................................................................80
3.14 Configuration Examples.................................................................................................................................81
3.14.1 Example for Configuring the ACL-based Packet Filtering Firewall.....................................................81
3.14.2 Example for Configuring ASPF and Port Mapping..............................................................................83
3.14.3 Example for Configuring the Blacklist..................................................................................................86
4 Traffic Suppression Configuration..........................................................................................90
4.1 Traffic Suppression Overview..........................................................................................................................91
4.2 Traffic Suppression Features Supported by the AR1200-S..............................................................................91
4.3 Configuring Traffic Suppression......................................................................................................................91
4.3.1 Establishing the Configuration Task.......................................................................................................91
4.3.2 Configuring Traffic Suppression on an Interface....................................................................................92
4.3.3 Checking the Configuration.....................................................................................................................93
4.4 Configuration Examples...................................................................................................................................93
4.4.1 Example for Setting the CIR Value for Traffic Suppression...................................................................93
4.4.2 Example for Setting the Rate Limit in pps for Traffic Suppression........................................................95
5 NAC Configuration.....................................................................................................................97
5.1 NAC Overview.................................................................................................................................................98
5.2 NAC Features Supported by the AR1200-S.....................................................................................................98
5.3 Configuring 802.1x Authentication................................................................................................................100
5.3.1 Establishing the Configuration Task.....................................................................................................100
5.3.2 Enabling Global 802.1x Authentication................................................................................................100
5.3.3 Enabling 802.1x Authentication on an Interface...................................................................................101
5.3.4 (Optional) Enabling MAC Address Bypass Authentication..................................................................101
5.3.5 (Optional) Setting the 802.1x Authentication Mode.............................................................................102
5.3.6 (Optional) Setting the Access Method on an Interface..........................................................................103
5.3.7 (Optional) Configuring the Authorization Status of an Interface..........................................................104
Issue 02 (2012-03-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
vii

Advertisement

Table of Contents
loading

Table of Contents