Redirection Policies and Role
The following procedure describes how to configure the redirection policies and user role.
1.To configure user roles to redirect the required traffic to the server(s), in thenode hierarchy, navigate to thetab.
2.Clickto create a new user role.
3.Enterfor Role Name.
4.Click.
5.Select的角色。
6.Click.
7.Clickintable.
8.Clicktab. Clickto create a new policy.
9.In thepop-up, select theoption. Enter theasand selectasfrom the drop-down list.
10.Click.
11.Select thepolicy under thetable.
12.Clickin thetable.
13.Selectas theinpopup.
14.Enter the following information in thetable.
IP version as
源.
Destination as.
Service/appShort form for application. It generally refers to the application that is downloaded and used on mobile devices.asand the Protocol as
Action as.
Enteras.
Enteras.
Selectas.refers to the direction of traffic from the untrusted client or user to the trusted server, such as theHTTPHypertext Transfer Protocol. The HTTP is an application protocol to transfer data over the web. The HTTP protocol defines how messages are formatted and transmitted, and the actions that the w servers and browsers should take in response to various commands.server or email server.
15.Click.
16.Repeat the steps to configure additional rules. This example adds a rule that specifies
17.Click.
18.Click.
19.In thewindow, select the check box and click.
The followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.commands define the redirection filter for sending traffic to theESIExternal Services Interface. ESI provides an open interface for integrating security solutions that solve interior network problems such as viruses, worms, spyware, and corporate compliance.server and apply thefirewallFirewall is a network security system used for preventing unauthorized access to or from a private network.policy to a user role in the route-modeESIExternal Services Interface. ESI provides an open interface for integrating security solutions that solve interior network problems such as viruses, worms, spyware, and corporate compliance.topology example.
(host) [md] (config) #ip access-list sessionpolicy
any any any redirect esi‑groupgroup方向都是黑名单
//For any incoming traffic, going to any destination,
//redirect the traffic to servers in the specified ESI group.
any any any permit
//For everything else, allow the traffic to flow normally.
(host) [md] (config) #user-rolerole
access‑list {eth | mac | session}
bandwidth‑contractname
captive‑portalname
dialername
pool {l2tp | pptp}
reauthentication‑intervalminutes
session‑aclname
vlanvlan_id