Qtech QSW-2900-24F-AC Руководство пользователя онлайн [8/209] 481596

1-6
6.5 DHCP Packet Processing Modes.....................................................................................6-107
6.6 Protocols and Standards..................................................................................................6-108
6.7 DHCP Relay Agent...........................................................................................................6-108
6.7.1 Usage of DHCP Relay Agent..........................................................................6-108
6.7.2 DHCP Relay Agent Fundamentals.................................................................6-108
6.7.3 Option 82 Supporting......................................................................................6-109
6.8 DHCP relay Configuration list...........................................................................................6-111
6.8.1 Enable DHCP relay..........................................................................................6-111
6.8.2 Configure vlan interface...................................................................................6-111
6.9 DHCP snooping...............................................................................................................6-112
6.9.1 Introduction to DHCP Snooping......................................................................6-112
6.10 Configuration DHCP snooping..........................................................................................6-113
6.10.1 Enable DHCP snooping..................................................................................6-113
6.10.2 Configure trust ports.......................................................................................6-113
6.10.3 Configure max host number...........................................................................6-113
6.10.4 Configure IP source guard..............................................................................6-114
6.10.5 Show DHCP snooping of ports.......................................................................6-114
6.10.6 Show DHCP snooping configuration of VLANs..............................................6-114
6.10.7 Show information of clients.............................................................................6-114
Chapter 7 ARP Configuration (Dynamic ARP Inspection).............................................................7-115
7.1 Brief Introduction of ARP..................................................................................................7-115
7.2 ARP configuration............................................................................................................7-115
7.2.1 Display ARP table item....................................................................................7-115
7.2.2 Enable/disable ARP anti-flood attack..............................................................7-116
7.2.3 Configure deny action and threshold of ARP anti-flood..................................7-116
7.2.4 Configure ARP anti-flood recover-time.........................................................7-116
7.2.5 ARP anti-flood MAC recover...........................................................................7-117
7.2.6 Display ARP anti-flood attack information....................................................7-117
7.2.7 Bind blackhole mac generated by arp anti-flood to be general......................7-117
7.2.8 Enable/disable ARP anti-spoofing..................................................................7-118
7.2.9 Configure unknown ARP packet handling strategy........................................7-118
7.2.10 Enable/disable ARP anti-spoofing valid-check...............................................7-119
7.2.11 Enable/disable ARP anti-spoofing deny-disguiser..........................................7-119
7.2.12 Display ARP anti-spoofing............................................................................7-119
7.2.13 Configure trust port of ARP anti-attack...........................................................7-120
Chapter 8 ACL Configuration.........................................................................................................8-121
8.1 ACL Overview..................................................................................................................8-121
8.1.1 ACL Match Order............................................................................................8-121
8.1.2 Ways to Apply ACL on a Switch......................................................................8-122
8.1.3 ACLs Based on Time Ranges.........................................................................8-122
8.2 Configuring ACL...............................................................................................................8-123
8.2.1 Matching order configuration..........................................................................8-123
8.2.2 ACL support....................................................................................................8-123
8.3 ACL configuration.............................................................................................................8-124
8.3.1 Configuration list.............................................................................................8-124
8.3.2 Configure time range......................................................................................8-124
8.3.3 Standard ACL..................................................................................................8-125
8.3.4 Define extended ACL......................................................................................8-126

Содержание

Скачать