work security designs require different topology designs, working modes, security zones, and
policy configurations. The basic configurations may include:
l
Create security zones, including the link layer (L2) and network layer (L3). Bind different
interfaces to correct security zones respectively.
l
Assign IP addresses to interfaces.
l
Configure the management functions of the interfaces and create the security policy rules.
l
Assign proper network addresses and configure the NAT rules as needed.
l
Configure routing of the system to ensure the network connectivity.
l
Configure security policy rules between security zones.
l
Configure network parameters, such as DHCP and DNS agent, etc.
Notes: For more information on protocols and configurations, see
StoneOS CLI
User Guide and StoneOS WebUI User Guide.
127
Chapter 4 Boot and Configuration
Содержание SG-6000 X Series
Страница 1: ...Hillstone SG 6000 X Series Hardware Reference Guide TechDocs docs hillstonenet com...
Страница 11: ...Troubleshooting the Configuration System 156 Appendix Supported Versions of Devices 158 TOC 9...
Страница 38: ...SCM 260 SCM D1T 260 SCM D2T 260 is shown as below SCM 100 SCM 20 is shown as below 26 Chapter 1 Product Profile...
Страница 40: ...SSM 100 SSM 80 is shown as below SSM 20 is shown as below 28 Chapter 1 Product Profile...
Страница 45: ...IOM 16SFP 100 is shown as below IOM 4XFP 100 is shown as below Chapter 1 Product Profile 33...
Страница 48: ...SIOM P100 300 is shown as below SIOM P100 260 is shown as below 36 Chapter 1 Product Profile...
Страница 80: ...Chapter 2 Installation Preparations 68...
Страница 83: ...71 Chapter 2 Installation Preparations...
Страница 84: ...Chapter 2 Installation Preparations 72...
Страница 85: ...73 Chapter 2 Installation Preparations...