
Configuring the Policy Routing .......................................................................................................................................................74
Viewing the Routing Table.................................................................................................................................................................75
Configuration Examples................................................................................................................................................. 76
Example for Configuring NAT ..........................................................................................................................................................76
Network Requirements..........................................................................................................................................................76
Network Topology....................................................................................................................................................................76
Configuration Scheme...........................................................................................................................................................76
Configuration Procedure......................................................................................................................................................77
Example for Configuring Load Balancing..................................................................................................................................79
Network Requirements..........................................................................................................................................................79
Network Topology....................................................................................................................................................................79
Configuration Scheme...........................................................................................................................................................79
Configuration Procedure......................................................................................................................................................80
Example for Configuring Virtual Server......................................................................................................................................80
Network Requirements..........................................................................................................................................................80
Network Topology....................................................................................................................................................................81
Configuration Scheme...........................................................................................................................................................81
Configuration Procedure......................................................................................................................................................81
Example for Configuring Policy Routing ....................................................................................................................................82
Network Requirements..........................................................................................................................................................82
Network Topology....................................................................................................................................................................82
Configuration Scheme...........................................................................................................................................................82
Configuration Procedure......................................................................................................................................................82
Configuring Firewall ..........................................................................................................85
Firewall .................................................................................................................................................................................. 86
Overview......................................................................................................................................................................................................86
Supported Features..............................................................................................................................................................................86
Firewall Configuration ..................................................................................................................................................... 88
Anti ARP Spoofing..................................................................................................................................................................................88
Adding IP-MAC Binding Entries ........................................................................................................................................88
Enable Anti ARP Spoofing....................................................................................................................................................91
Configuring Attack Defense.............................................................................................................................................................93
Configuring MAC Filtering..................................................................................................................................................................95
Configuring Access Control.............................................................................................................................................................96
Configuration Examples................................................................................................................................................. 98
Example for Anti ARP Spoofing ......................................................................................................................................................98