H3c-technologies H3C SecPath F5020 Uživatelský manuál Strana 9

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 82
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 8
iii
ND MAD-enabled IRF configuration example ···································································································· 56
Configuration example for restoring standalone mode ···················································································· 59
Configuring contexts ·················································································································································· 62
Overview ········································································································································································· 62
Context applications ············································································································································· 62
Default context and non-default contexts ············································································································ 62
Feature and hardware compatibility ···························································································································· 63
Context configuration task list ······································································································································· 63
Creating contexts ··························································································································································· 63
Assigning contexts to security engines ························································································································· 64
Configuring security engine groups ···················································································································· 64
Assigning a context to a security engine group ································································································· 65
Assigning resources to a context ·································································································································· 65
Assigning CPU, disk, and memory resources to a context ··············································································· 65
Assigning interfaces to a context ························································································································· 67
Assigning VLANs to a context ······························································································································ 67
Configuring resource limits for contexts ·············································································································· 67
Starting a context ··························································································································································· 69
Accessing a context ······················································································································································· 69
Displaying and maintaining contexts ··························································································································· 69
Context configuration example ···································································································································· 70
Index ··········································································································································································· 73
Zobrazit stránku 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 81 82

Komentáře k této Příručce

Žádné komentáře