Configuring the Link Backup ............................................................................................................................................................92
Configuring the Online Detection ..................................................................................................................................................93
Routing Configurations ................................................................................................................................................... 94
Configuring the Static Routing ........................................................................................................................................................94
Configuring the Policy Routing .......................................................................................................................................................95
Viewing the Routing Table .................................................................................................................................................................96
Configuration Examples ................................................................................................................................................. 97
Example for Configuring NAT ..........................................................................................................................................................97
Example for Configuring Load Balancing ..................................................................................................................................99
Example for Configuring Virtual Server ...................................................................................................................................100
Example for Configuring Policy Routing .................................................................................................................................102
Firewall ................................................................................................................................................................................106
Overview ...................................................................................................................................................................................................106
Supported Features ...........................................................................................................................................................................106
Firewall Configuration ...................................................................................................................................................108
Anti ARP Spoofing ...............................................................................................................................................................................108
Configuring Attack Defense ..........................................................................................................................................................114
Configuring MAC Filtering ...............................................................................................................................................................115
Configuring Access Control ..........................................................................................................................................................117
Configuration Examples ...............................................................................................................................................119
Example for Anti ARP Spoofing ...................................................................................................................................................119
Example for Access Control .........................................................................................................................................................122
Behavior Control .............................................................................................................................................................129
Overview ...................................................................................................................................................................................................129
Supported Features ...........................................................................................................................................................................129
Behavior Control Configuration ................................................................................................................................130
Configuring Web Filtering ...............................................................................................................................................................130
Configuring Web Security ...............................................................................................................................................................135
Configuration Examples ...............................................................................................................................................137
Example for Access Control .........................................................................................................................................................137
Example for Web Security ..............................................................................................................................................................141
VPN ....................................................................................................................................................................................... 144
Overview ...................................................................................................................................................................................................144
Supported Features ...........................................................................................................................................................................145
IPSec VPN Configuration .............................................................................................................................................149
Configuring the IPSec Policy.........................................................................................................................................................149
Verifying the Connectivity of the IPSec VPN tunnel ........................................................................................................155
GRE VPN Configuration ................................................................................................................................................156