Qtech QSW-3900-48-SFP-DC Руководство пользователя v1-7 онлайн [9/245] 481613

Qtech QSW-3900-48-SFP-DC Руководство пользователя v1-7 онлайн [9/245] 481613
QTECH Software Configuration Manual
1-8
12.1.2 ARP probe..........................................................................................................12-163
12.1.3 ARP mediation...................................................................................................12-163
12.1.4 Variants of the protocol......................................................................................12-163
12.1.5 Inverse ARP and Reverse ARP.........................................................................12-163
12.2 ARP spoofing.......................................................................................................................12-164
12.2.1 How ARP spooing works?..................................................................................12-164
12.2.2 ARP Spoofing/poising Animation.......................................................................12-164
12.3 ARP-Proxy...........................................................................................................................12-164
12.4 Anti-flood ARP......................................................................................................................12-165
12.5 ARP configuration list...........................................................................................................12-165
12.5.1 Add and delete ARP table item..........................................................................12-165
12.5.2 Display ARP table item.......................................................................................12-165
12.5.3 Configure ARP aging time..................................................................................12-166
12.5.4 Display ARP aging time......................................................................................12-166
12.5.5 Display ARP table item.......................................................................................12-166
12.5.6 Enable/disable ARP anti-flood attack.................................................................12-166
12.5.7 Configure deny action and threshold of ARP anti-flood.....................................12-167
12.5.8 Configure ARP anti-flood recover-time............................................................12-167
12.5.9 ARP anti-flood MAC recover..............................................................................12-167
12.5.10 Display ARP anti-flood attack information.......................................................12-168
12.5.11 Bind blackhole mac generated by arp anti-flood to be general.........................12-168
12.5.12 Enable/disable ARP anti-spoofing......................................................................12-168
12.5.13 Configure unknown ARP packet handling strategy...........................................12-168
12.5.14 Enable/disable ARP anti-spoofing valid-check..................................................12-169
12.5.15 Enable/disable ARP anti-spoofing deny-disguiser.............................................12-169
12.5.16 Display ARP anti-spoofing...............................................................................12-169
12.5.17 Configure trust port of ARP anti-attack..............................................................12-170
Chapter 13 ACL Configuration.............................................................................................................13-171
13.1 ACL Overview......................................................................................................................13-171
13.1.1 ACL Match Order...............................................................................................13-171
13.1.2 Ways to Apply ACL on a Switch.........................................................................13-172
13.1.3 ACLs Based on Time Ranges............................................................................13-172
13.2 Configuring ACL...................................................................................................................13-173
13.2.1 Matching order configuration.............................................................................13-173
13.2.2 ACL support.......................................................................................................13-173
13.3 ACL configuration.................................................................................................................13-174
13.3.1 Configuration list................................................................................................13-174
13.3.2 Configure time range..........................................................................................13-174
13.3.3 Standard ACL.....................................................................................................13-175
13.3.4 Define extended ACL.........................................................................................13-175
13.3.5 Define layer 2 ACL.............................................................................................13-176
13.3.6 Activate ACL.......................................................................................................13-177
13.3.7 Monitor and maintanence of ACL.......................................................................13-177
Chapter 14 QOS Configuration...........................................................................................................14-179
14.1 Brief introduction of QOS......................................................................................................14-179
14.1.1 Flow....................................................................................................................14-179
14.1.2 Traffic classification............................................................................................14-179
14.1.3 Access control list..............................................................................................14-179
14.1.4 Packet filtration...................................................................................................14-179
14.1.5 Flow monitor.......................................................................................................14-180
14.1.6 Interface speed limitation...................................................................................14-180
14.1.7 Redirection.........................................................................................................14-180
14.1.8 Priority mark.......................................................................................................14-180

Содержание

Похожие устройства

Скачать