Configuration considerations ····························································································································· 345
Packet check principles ······································································································································· 346
Configuration procedure ···································································································································· 346
Network requirements ········································································································································· 347
Configuration considerations ····························································································································· 347
Packet check principles ······································································································································· 348
Configuration procedure ···································································································································· 348
Network requirements ········································································································································· 349
Configuration considerations ····························································································································· 349
Packet check principles ······································································································································· 350
Configuration procedure ···································································································································· 350
Configuring blacklist ··············································································································································· 352
Overview ······································································································································································· 352
Configuring the blacklist feature ································································································································· 352
Blacklist configuration example ·································································································································· 353
Network requirements ········································································································································· 353
Configuration procedure ···································································································································· 353
Verifying the configuration ································································································································· 353
Configuring FIPS······················································································································································ 355
Overview ······································································································································································· 355
FIPS self-tests ································································································································································· 355
Power-up self-test ················································································································································· 355
Conditional self-tests ············································································································································ 355
Triggering a self-test ············································································································································ 355
Configuration procedure ············································································································································· 356
Enabling the FIPS mode ······································································································································ 356
Triggering a self-test ············································································································································ 357
Displaying and maintaining FIPS ······························································································································· 357
FIPS configuration example········································································································································· 357
Network requirements ········································································································································· 357
Configuration procedure ···································································································································· 357
Verifying the configuration ································································································································· 358
Index ········································································································································································ 360
x