Configuring the Policy Routing .......................................................................................................................................................74
Viewing the Routing Table .................................................................................................................................................................75
Configuration Examples ................................................................................................................................................. 76
Example for Configuring NAT ..........................................................................................................................................................76
Network Requirements ..........................................................................................................................................................76
Network Topology ....................................................................................................................................................................76
Configuration Scheme ...........................................................................................................................................................76
Configuration Procedure ......................................................................................................................................................77
Network Requirements ..........................................................................................................................................................79
Network Topology ....................................................................................................................................................................79
Configuration Scheme ...........................................................................................................................................................79
Configuration Procedure ......................................................................................................................................................80
Network Requirements ..........................................................................................................................................................80
Network Topology ....................................................................................................................................................................81
Configuration Scheme ...........................................................................................................................................................81
Configuration Procedure ......................................................................................................................................................81
Network Requirements ..........................................................................................................................................................82
Network Topology ....................................................................................................................................................................82
Configuration Scheme ...........................................................................................................................................................82
Configuration Procedure ......................................................................................................................................................82
Configuring Firewall ..........................................................................................................85
Firewall .................................................................................................................................................................................. 86
Overview ......................................................................................................................................................................................................86
Supported Features ..............................................................................................................................................................................86
Firewall Configuration ..................................................................................................................................................... 88
Anti ARP Spoofing ..................................................................................................................................................................................88
Adding IP-MAC Binding Entries ........................................................................................................................................88
Enable Anti ARP Spoofing ....................................................................................................................................................91
Configuring Attack Defense .............................................................................................................................................................93
Configuring MAC Filtering ..................................................................................................................................................................95
Configuring Access Control .............................................................................................................................................................96
Configuration Examples ................................................................................................................................................. 98
Example for Anti ARP Spoofing ......................................................................................................................................................98