
Configuring the Static Routing........................................................................................................................................................74
Configuring the Policy Routing .......................................................................................................................................................75
Viewing the Routing Table.................................................................................................................................................................76
Configuration Examples................................................................................................................................................. 77
Example for Configuring NAT ..........................................................................................................................................................77
Network Requirements..........................................................................................................................................................77
Network Topology....................................................................................................................................................................77
Configuration Scheme...........................................................................................................................................................77
Configuration Procedure......................................................................................................................................................78
Example for Configuring Load Balancing..................................................................................................................................80
Network Requirements..........................................................................................................................................................80
Network Topology....................................................................................................................................................................80
Configuration Scheme...........................................................................................................................................................80
Configuration Procedure......................................................................................................................................................81
Example for Configuring Virtual Server......................................................................................................................................81
Network Requirements..........................................................................................................................................................81
Network Topology....................................................................................................................................................................82
Configuration Scheme...........................................................................................................................................................82
Configuration Procedure......................................................................................................................................................82
Example for Configuring Policy Routing ....................................................................................................................................83
Network Requirements..........................................................................................................................................................83
Network Topology....................................................................................................................................................................83
Configuration Scheme...........................................................................................................................................................83
Configuration Procedure......................................................................................................................................................83
Configuring Firewall ..........................................................................................................86
Firewall .................................................................................................................................................................................. 87
Overview......................................................................................................................................................................................................87
Supported Features..............................................................................................................................................................................87
Firewall Configuration ..................................................................................................................................................... 89
Anti ARP Spoofing..................................................................................................................................................................................89
Adding IP-MAC Binding Entries ........................................................................................................................................89
Enable Anti ARP Spoofing....................................................................................................................................................92
Configuring Attack Defense.............................................................................................................................................................94
Configuring MAC Filtering..................................................................................................................................................................96
Configuring Access Control.............................................................................................................................................................97
Configuration Examples................................................................................................................................................. 99