H3C S5120-HI Security Configuration Manual page 17

Hide thumbs Also See for S5120-HI:
Table of Contents

Advertisement

Configuration considerations ····························································································································· 345
Packet check principles ······································································································································· 346
Configuration procedure ···································································································································· 346
SAVI configuration in SLAAC-only address assignment scenario ··········································································· 347
Network requirements ········································································································································· 347
Configuration considerations ····························································································································· 347
Packet check principles ······································································································································· 348
Configuration procedure ···································································································································· 348
SAVI configuration in DHCPv6+SLAAC address assignment scenario ·································································· 349
Network requirements ········································································································································· 349
Configuration considerations ····························································································································· 349
Packet check principles ······································································································································· 350
Configuration procedure ···································································································································· 350
Configuring blacklist ··············································································································································· 352
Overview ······································································································································································· 352
Configuring the blacklist feature ································································································································· 352
Displaying and maintaining the blacklist ·················································································································· 352
Blacklist configuration example ·································································································································· 353
Network requirements ········································································································································· 353
Configuration procedure ···································································································································· 353
Verifying the configuration ································································································································· 353
Configuring FIPS······················································································································································ 355
Overview ······································································································································································· 355
FIPS self-tests ································································································································································· 355
Power-up self-test ················································································································································· 355
Conditional self-tests ············································································································································ 355
Triggering a self-test ············································································································································ 355
Configuration procedure ············································································································································· 356
Enabling the FIPS mode ······································································································································ 356
Triggering a self-test ············································································································································ 357
Displaying and maintaining FIPS ······························································································································· 357
FIPS configuration example········································································································································· 357
Network requirements ········································································································································· 357
Configuration procedure ···································································································································· 357
Verifying the configuration ································································································································· 358
Index ········································································································································································ 360
x
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

Table of Contents