R3204P16-HP Load Balancing Module Security Configuration Guide-6PW101
ii
Enabling TCP proxy for a security zone ············································································································· 41
Adding a protected IP address entry ··················································································································· 42
Displaying information about protected IP address entries ·············································································· 42
TCP proxy configuration example ································································································································ 43
Configuration guidelines ··············································································································································· 45
ACL configuration ······················································································································································ 46
ACL overview ································································································································································· 46
ACL categories ······················································································································································ 46
ACL numbering and naming ································································································································ 46
Match order ··························································································································································· 46
ACL rule comments ················································································································································ 47
ACL rule numbering ·············································································································································· 47
Fragments filtering with ACLs ······························································································································· 48
ACL acceleration ··················································································································································· 48
Configuring an ACL in the web ···································································································································· 48
Configuration task list ··········································································································································· 48
Configuring a time range ····································································································································· 49
Creating an ACL ···················································································································································· 50
Configuring a basic ACL rule ······························································································································ 51
Configuring an advance ACL rule ······················································································································· 52
Configuring an Ethernet frame header ACL rule ······························································································· 55
Configuring ACL acceleration ······························································································································ 56
ACL configuration example ·································································································································· 56
Configuring an ACL at the CLI ······································································································································ 60
ACL configuration task list ···································································································································· 60
Configuring an ACL ······················································································································································· 61
Configuring a time range ····································································································································· 61
Configuring an IPv4 basic ACL ··························································································································· 61
Configuring an IPv4 advanced ACL···················································································································· 62
Configuring an Ethernet frame header ACL ······································································································· 63
Copying an IPv4 ACL ··········································································································································· 64
Enabling ACL acceleration for an IPv4 ACL ······································································································· 64
Displaying and maintaining ACLs ······················································································································· 64
ACL configuration examples ································································································································ 65
PKI configuration ························································································································································ 67
PKI overview ··································································································································································· 67
Introduction to PKI ················································································································································· 67
PKI terms ································································································································································· 67
Architecture of PKI ················································································································································· 68
Applications of PKI ················································································································································ 69
Operation of PKI ···················································································································································· 69
Configuring PKI in the web interface ··························································································································· 69
Configuration task list ··········································································································································· 69
Creating a PKI entity ············································································································································· 72
Creating a PKI domain ········································································································································· 73
Generating an RSA key pair ································································································································ 76
Destroying the RSA key pair ································································································································ 77
Retrieving and displaying a certificate ··············································································································· 77
Requesting a local certificate ······························································································································· 78
Retrieving and displaying a cRL ·························································································································· 79
PKI configuration examples ·································································································································· 80
Configuring PKI in the CLI ············································································································································· 89
PKI configuration task list ······································································································································ 89