Operation Manual - Getting Started
H3C SecPath F1800-A Firewall Table of Contents
ii
2.5 User Management ........................................................................................................... 1-47
2.5.1 Overview of User Management............................................................................. 1-47
2.5.2 User Management Configuration .......................................................................... 1-49
2.5.3 User Login Information Configuration ................................................................... 1-51
2.5.4 Typical Examples of Configuration........................................................................ 1-53
2.6 User Interface .................................................................................................................. 1-53
2.6.1 User Interface Overview........................................................................................ 1-53
2.6.2 Entering User Interface View ................................................................................ 1-54
2.6.3 Configuring Asynchronous Interface Attributes..................................................... 1-55
2.6.4 Configuring Terminal Attributes............................................................................. 1-57
2.6.5 Configuring Modem Attributes............................................................................... 1-58
2.6.6 Configuring Redirection......................................................................................... 1-58
2.6.7 Configuring Call-in or Call-out Restriction on VTY User Interface ........................ 1-60
2.6.8 Displaying and Debugging User Interface ............................................................ 1-60
2.7 Terminal Service.............................................................................................................. 1-61
2.7.1 Configuring Terminal Service on the Console Interface ....................................... 1-61
2.7.2 Configuring Terminal Service on the AUX Port..................................................... 1-61
2.7.3 Configuring Telnet Terminal Service..................................................................... 1-62
2.7.4 Configuring SSH Terminal Service ....................................................................... 1-65
Chapter 3 Working Mode............................................................................................................ 1-71
3.1 Working Mode Overview.................................................................................................. 1-71
3.1.1 Introduction to Working Mode ............................................................................... 1-71
3.1.2 Working Process of Route Mode .......................................................................... 1-73
3.1.3 Working Process of Transparent Mode ................................................................ 1-74
3.1.4 Working Process of Composite Mode................................................................... 1-78
3.2 Route Mode Configuration............................................................................................... 1-78
3.2.1 Configuring the SecPath F1800-A to Work in Route Mode .................................. 1-78
3.2.2 Setting Other Parameters in Route Mode............................................................. 1-79
3.3 Transparent Mode Configuration..................................................................................... 1-79
3.3.1 Configuring Transparent Mode for the SecPath F1800-A .................................... 1-79
3.3.2 Configuring Address Entries ................................................................................. 1-79
3.3.3 Configuring Processing Mode of IP Packets with Unknown MAC Address.......... 1-80
3.3.4 Setting Aging Time of MAC Address Forwarding Table ....................................... 1-80
3.4 Composite Mode Configuration ....................................................................................... 1-81
3.4.1 Configuring the SecPath F1800-A to Work in Composite Mode........................... 1-81
3.4.2 Setting Other Parameters in Composite Mode ..................................................... 1-81
3.5 Displaying and Debugging Firewall Working Mode ......................................................... 1-81
3.6 Typical Example for Configuring Firewall Working Mode................................................ 1-82
3.6.1 Processing IP Packet with Unknown MAC Address ............................................. 1-82
3.6.2 Connecting Multiple LANs with the SecPath F1800-A in Transparent Mode ....... 1-83