H3C SecPath F1000系列 防火墙原先作为出口防火墙,现在改为二层出了安全策略和流控以外,其他配置均接在深信服AD上,现在防火墙和深信服AD做聚合,防火墙纯透明做二层,但是深信服AD做不了流控,麻烦问下这些针对接口的流控,二层防火墙能做么,下面是部分配置policy-based-route yidong permit node 5 if-match acl 2001 apply next-hop 60.173.220.1 # policy-based-route yidong permit node 8 if-match acl 2005 apply next-hop 112.27.126.1 # policy-based-route yidong permit node 10 if-match acl 2006 apply next-hop 112.27.246.1 # policy-based-route yidong permit node 100 if-match acl 3999 # interface Bridge-Aggregation11 port access vlan 100 # interface Route-Aggregation22 ip address 192.168.0.254 255.255.255.0 nat outbound 3900 nat hairpin enable ip policy-based-route yidonginterface GigabitEthernet1/0/5 port link-mode route ip address 60.173.220.71 255.255.255.0 nat outbound 2000 address-group 60
H3C SecPath F1000系列 防火墙原先作为出口防火墙,现在改为二层出了安全策略和流控以外,其他配置均接在深信服AD上,现在防火墙和深信服AD做聚合,防火墙纯透明做二层,但是深信服AD做不了流控,麻烦问下这些针对接口的流控,二层防火墙能做么,下面是部分配置policy-based-route yidong permit node 5 if-match acl 2001 apply next-hop 60.173.220.1 # policy-based-route yidong permit node 8 if-match acl 2005 apply next-hop 112.27.126.1 # policy-based-route yidong permit node 10 if-match acl 2006 apply next-hop 112.27.246.1 # policy-based-route yidong permit node 100 if-match acl 3999 # interface Bridge-Aggregation11 port access vlan 100 # interface Route-Aggregation22 ip address 192.168.0.254 255.255.255.0 nat outbound 3900 nat hairpin enable ip policy-based-route yidonginterface GigabitEthernet1/0/5 port link-mode route ip address 60.173.220.71 255.255.255.0 nat outbound 2000 address-group 60
(0)
最佳答案
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
客户不知道从哪问的客服,客服说可以用安全域做流控。。。