没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论








i
目 录
1 访问控制 ············································································································································ 1-1
1.1 概述 ··················································································································································· 1-1
1.2 配置访问控制 ····································································································································· 1-1
1.3 访问控制典型配置举例 ······················································································································ 1-3
2 网站过滤 ············································································································································ 2-1
2.1 概述 ··················································································································································· 2-1
2.2 网站过滤典型配置举例 ······················································································································ 2-3
3 攻击防范 ············································································································································ 3-1
3.1 概述 ··················································································································································· 3-1
3.1.1 黑名单功能 ······························································································································ 3-1
3.1.2 入侵检测功能 ·························································································································· 3-1
3.2 配置黑名单 ········································································································································ 3-3
3.2.1 配置概述 ································································································································· 3-3
3.2.2 启用黑名单过滤功能 ··············································································································· 3-4
3.2.3 手动新建黑名单表项 ··············································································································· 3-4
3.2.4 查看黑名单 ······························································································································ 3-5
3.3 配置入侵检测 ····································································································································· 3-5
3.4 攻击防范典型配置举例 ······················································································································ 3-7
3.4.1 攻击防范典型配置举例(MSR 900/20-1X系列支持) ···························································· 3-7
3.4.2 攻击防范典型配置举例(MSR 20/30/36/50 系列支持) ······················································· 3-11
4 应用控制 ············································································································································ 4-1
4.1 概述 ··················································································································································· 4-1
4.2 配置应用控制 ····································································································································· 4-1
4.2.1 配置概述 ································································································································· 4-1
4.2.2 加载应用程序 ·························································································································· 4-1
4.2.3 配置自定义应用程序 ··············································································································· 4-2
4.2.4 使能应用控制 ·························································································································· 4-3
4.3 应用控制典型配置举例 ······················································································································ 4-4

1-1
1 访问控制
1.1
概述
访问控制是指通过设置时间段、局域网内计算机的 IP 地址、端口范围和数据包协议类型,禁止符合
指定条件的数据包通过,来限制局域网内的计算机对 Internet 的访问。
设备最多支持配置 10 条访问控制策略。10 条访问控制策略是按照序号从小到大的顺序匹配的,当
数据流满足某条策略时,不再继续匹配。
• 10 条访问控制策略按照其序号从小到大分别对应 ACL 3980~3989,修改这些 ACL 的配置可
能会影响访问控制功能的使用。
• 访问控制功能只对 WAN 接口有效,并且只对接口的出方向有效。
1.2
配置访问控制
在导航栏中选择“安全配置 > 访问控制”,进入如 图 1-1 所示的页面。

1-2
图1-1 访问控制
一条访问控制策略的详细配置如 表 1-1
所示。
表1-1 访问控制策略的详细配置
配置项 说明
起止时间
设置一天内生效的时间段,起始
时间应早于终止时间
起止时间和星期必须同时设置或同时不设置(即起止时
间为 00:00~00:00,且星期中不选择任何一项)。都
不设置时,表示该条访问控制策略在所有时间都有效
星期
设置一周内生效的时间,在星期
日~星期六中进行选择
协议
设置通过传输数据包所使用协议类型进行上网控制
协议类型的选项有TCP、UDP和IP
常用服务的协议类型请参见表1-2
源IP地址
设置局域网中需要被控制的计算机的IP地址范围
如果只对单个IP地址(如192.168.1.2)进行上网控制,IP地址范围就输入“192.168.1.2”~
“192.168.1.2”
目的端口
设置局域网中计算机访问Internet的服务端口
例如,对于telnet端口(23),就输入“23”~“23”
操作 显示对符合条件的数据包所执行的操作为“禁止”,即禁止符合条件的数据包通过

1-3
表1-2 常用服务和端口范围表
服务 协议 端口范围
FTP服务器 TCP 21
Telnet服务器 TCP 23
TFTP服务器 UDP 69
Web服务器 TCP 80
1.3
访问控制典型配置举例
1. 组网需求
如 图 1-2
所示,某企业内部用户Host A~Host D通过Router访问Internet。通过配置访问控制策略,
实现如下需求:
• Host A~Host C 在工作时间(星期一~星期五的 09:00~18:00)不能访问 Internet,其余时
间可以访问。
• Host D 任何时间都可以访问 Internet。
图1-2 访问控制配置组网图
2. 配置步骤
# 配置访问控制策略,禁止 Hos
t A~Host C 在工作时间访问 Internet。
• 在导航栏中选择“安全配置 > 访问控制”,进行如下配置,如 图 1-3 所示。

1-4
图1-3 配置访问控制策略
• 选择起止时间为“09:00”~“18:00”。
• 选中星期“一”~“五”前的复选框。
• 选择协议为“IP”。
• 输入源 IP 地址为“10.1.1.1”~“10.1.1.3”。
• 单击<应用>按钮完成操作。
剩余28页未读,继续阅读
资源评论


qq_25105197
- 粉丝: 2
- 资源: 10
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


安全验证
文档复制为VIP权益,开通VIP直接复制
