Configuring the Static Routing ........................................................................................................................................................73
Configuring the Policy Routing .......................................................................................................................................................74
Viewing the Routing Table .................................................................................................................................................................75
Configuration Examples ................................................................................................................................................. 76
Example for Configuring NAT ..........................................................................................................................................................76
Network Requirements ..........................................................................................................................................................76
Network Topology ....................................................................................................................................................................76
Configuration Scheme ...........................................................................................................................................................76
Configuration Procedure ......................................................................................................................................................77
Example for Configuring Load Balancing ..................................................................................................................................79
Network Requirements ..........................................................................................................................................................79
Network Topology ....................................................................................................................................................................79
Configuration Scheme ...........................................................................................................................................................79
Configuration Procedure ......................................................................................................................................................80
Example for Configuring Virtual Server ......................................................................................................................................80
Network Requirements ..........................................................................................................................................................80
Network Topology ....................................................................................................................................................................81
Configuration Scheme ...........................................................................................................................................................81
Configuration Procedure ......................................................................................................................................................81
Example for Configuring Policy Routing ....................................................................................................................................82
Network Requirements ..........................................................................................................................................................82
Network Topology ....................................................................................................................................................................82
Configuration Scheme ...........................................................................................................................................................82
Configuration Procedure ......................................................................................................................................................82
Configuring Firewall
Firewall .................................................................................................................................................................................. 86
Overview ......................................................................................................................................................................................................86
Supported Features ..............................................................................................................................................................................86
Firewall Configuration ..................................................................................................................................................... 88
Anti ARP Spoofing ..................................................................................................................................................................................88
Adding IP-MAC Binding Entries ........................................................................................................................................88
Enable Anti ARP Spoofing ....................................................................................................................................................91
Configuring Attack Defense .............................................................................................................................................................93
Configuring MAC Filtering ..................................................................................................................................................................95
Configuring Access Control .............................................................................................................................................................96
Configuration Examples ................................................................................................................................................. 98