Applying an ASPF policy to an interface

The following matrix shows the feature and hardware compatibility:

Hardware

Feature compatibility

MSR900

Yes

MSR93X

Yes

MSR20-1X

No

MSR20

Yes

MSR30

Yes

MSR50

Yes

MSR1000

Yes

Two concepts are distinguished in ASPF policy: internal interface and external interface.

If the device is connected to both the internal network and the Internet, and employs ASPF to protect the internal servers, the interface connected to the internal network is the internal interface and the one connected to the Internet is the external interface.

If both ASPF and ACL-based packet-filter firewall are applied to the external interface, access to the internal network from the Internet is denied. The response packet can pass ASPF when internal network users access the Internet.

To monitor the traffic through an interface, you must apply the configured ASPF policy to that interface.

Make sure a connection initiation packet and the corresponding return packet are based on the same interface, because it is based on interfaces that an ASPF stores and maintains the application layer protocol status.

To apply an ASPF policy on an Interface:

Step

Command

Remarks

1. Enter system view.

system-view

N/A

2. Enter interface view.

interface interface-type interface-number

N/A

3. Apply an ASPF policy to the interface.

firewall aspf aspf-policy-number { inbound | outbound }

Not applied by default.