User's Manual Part 2
6.7.6OSPFPoint‐to‐pointConfigurationEx ample...............................................40
6.8ConfiguringIPv6 .................................................................................................42
6.8.1AddressConfiguration.................................................................................42
6.8.2RoutingConfiguration .................................................................................42
6.8.3Ping6 ...........................................................................................................43
Chapter7NetworkSecurity.................................................................................. 44
7.1AccessControlList(ACL) ....................................................................................44
7.1.1StandardACL...............................................................................................44
7.1.2ExtendedACL ..............................................................................................44
7.1.3SessionACL .................................................................................................45
7.2Session................................................................................................................45
7.3ConfiguringNAT .................................................................................................46
7.3.1ConfiguringSNAT ........................................................................................47
7.3.2ConfiguringDNAT........................................................................................48
7.4ConfiguringDoSAnti‐attack...............................................................................49
7.4.1SystemPre‐definedConfiguration ..............................................................49
7.4.2ConfiguringAnti‐attack ...............................................................................49
7.5ConfiguringLawfulIntercept..............................................................................50
Chapter8ConfiguringHQoS ................................................................................. 52
8.1ConfiguringRateLimitationonPort...................................................................52
8.2ConfiguringRateLimitationonVLAN ................................................................52
8.3ConfiguringRateLimitationonUser..................................................................52
Chapter9ConfiguringAAA ................................................................................... 54
9.1TheAttributeofTrustandUntrust.....................................................................54
9.2UserandUserRole.............................................................................................54
9.2.1User .............................................................................................................54
9.2.2UserRoleandACL.......................................................................................55
9.2.3AccessPolicyBasedonUserRole ...............................................................55
9.3ConnectionsamongUser,VLANandUserRole .................................................56
9.4ConfiguringAAAProfile......................................................................................56
9.4.1ConfiguringACL...........................................................................................57