Huawei S9700 Series Configuration Manual page 8

Terabit routing switches spu
Hide thumbs Also See for S9700 Series:
Table of Contents

Advertisement

S9700 Core Routing Switch
Configuration Guide - SPU
2.14.1 Displaying the Firewall Configuration..................................................................................................66
2.14.2 Clearing the Firewall Statistics..............................................................................................................67
2.15 Configuration Examples.................................................................................................................................67
2.15.1 Example for Configuring the ACL-based Packet Filtering Firewall.....................................................68
2.15.2 Example for Configuring ASPF and Port Mapping..............................................................................71
2.15.3 Example for Configuring the Blacklist..................................................................................................75
2.15.4 Example for Configuring the Transparent Firewall...............................................................................79
3 NAT Configuration.....................................................................................................................84
3.1 NAT Overview.................................................................................................................................................85
3.2 NAT Features Supported by the SPU...............................................................................................................86
3.3 Configuring NAT.............................................................................................................................................89
3.3.1 Establishing the Configuration Task.......................................................................................................89
3.3.2 Configuring an Address Pool..................................................................................................................90
3.3.3 Associating an ACL with an Address Pool.............................................................................................91
3.3.4 Configuring Easy IP................................................................................................................................91
3.3.5 Configuring an Internal Server................................................................................................................92
3.3.6 Configuring Static NAT..........................................................................................................................92
3.3.7 Enabling NAT ALG................................................................................................................................93
3.3.8 Configuring NAT Filtering......................................................................................................................93
3.3.9 Configuring NAT Mapping.....................................................................................................................94
3.3.10 Configuring DNS Mapping...................................................................................................................95
3.3.11 Configuring Twice NAT.......................................................................................................................95
3.3.12 Checking the Configuration...................................................................................................................96
3.4 Configuration Examples...................................................................................................................................96
3.4.1 Example for Configuring the NAT Server..............................................................................................96
3.4.2 Example for Configuring Static NAT...................................................................................................100
3.4.3 Example for Configuring Outbound NAT.............................................................................................104
3.4.4 Example for Configuring Twice NAT...................................................................................................107
4 IPSec Configuration..................................................................................................................112
4.1 IPSec Overview..............................................................................................................................................113
4.2 IPSec Features Supported by the SPU............................................................................................................114
4.3 Establishing an IPSec Tunnel Manually.........................................................................................................115
4.3.1 Establishing the Configuration Task.....................................................................................................115
4.3.2 Defining Protected Data Flows..............................................................................................................116
4.3.3 Configuring an IPSec Proposal..............................................................................................................116
4.3.4 Configuring an IPSec Policy.................................................................................................................117
4.3.5 Applying an IPSec Policy to an Interface..............................................................................................119
4.3.6 Checking the Configuration...................................................................................................................119
4.4 Establishing an IPSec Tunnel Through IKE Negotiation...............................................................................120
4.4.1 Establishing the Configuration Task.....................................................................................................120
4.4.2 Defining Protected Data Flows..............................................................................................................121
4.4.3 Configuring an IKE Proposal................................................................................................................121
Issue 01 (2012-03-15)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
vii

Advertisement

Table of Contents
loading

Table of Contents