Qtech QSW-3900-48-Т-DC Руководство пользователя онлайн [10/313] 481615

Qtech QSW-3900-48-Т-AC Руководство пользователя онлайн [10/313] 481614
QTECH Software Configuration Manual
1-9
14.4 Anti-flood ARP ......................................................................................................................14-226
14.5 ARP configuration list............................................................................................................14-226
14.5.1 Add and delete ARP table item.......................................................................... 14-226
14.5.2 Display ARP table item ...................................................................................... 14-227
14.5.3 Configure ARP aging time ................................................................................. 14-227
14.5.4 Display ARP aging time ..................................................................................... 14-227
14.5.5 Display ARP table item ...................................................................................... 14-227
14.5.6 Enable/disable ARP anti-flood attack................................................................. 14-227
14.5.7 Configure deny action and threshold of ARP anti-flood..................................... 14-228
14.5.8 Configure ARP anti-flood recover-time ........................................................... 14-228
14.5.9 ARP anti-flood MAC recover.............................................................................. 14-228
14.5.10 Display ARP anti-flood attack information....................................................... 14-229
14.5.11 Bind blackhole mac generated by arp anti-flood to be general......................... 14-229
14.5.12 Enable/disable ARP anti-spoofing ..................................................................... 14-229
14.5.13 Configure unknown ARP packet handling strategy ........................................... 14-230
14.5.14 Enable/disable ARP anti-spoofing valid-check .................................................. 14-230
14.5.15 Enable/disable ARP anti-spoofing deny-disguiser............................................. 14-230
14.5.16 Display ARP anti-spoofing .............................................................................. 14-231
14.5.17 Configure trust port of ARP anti-attack .............................................................. 14-231
Chapter 15 ACL Configuration ............................................................................................................ 15-232
15.1 ACL Overview.......................................................................................................................15-232
15.1.1 ACL Match Order ............................................................................................... 15-232
15.1.2 Ways to Apply ACL on a Switch......................................................................... 15-233
15.1.3 ACLs Based on Time Ranges............................................................................ 15-233
15.2 Configuring ACL....................................................................................................................15-234
15.2.1 Matching order configuration ............................................................................. 15-234
15.2.2 ACL support ....................................................................................................... 15-234
15.3 ACL configuration..................................................................................................................15-235
15.3.1 Configuration list ................................................................................................ 15-235
15.3.2 Configure time range ......................................................................................... 15-235
15.3.3 Standard ACL..................................................................................................... 15-236
15.3.4 Define extended ACL......................................................................................... 15-236
15.3.5 Define layer 2 ACL ............................................................................................. 15-237
15.3.6 Activate ACL....................................................................................................... 15-238
15.3.7 Monitor and maintanence of ACL ...................................................................... 15-238
Chapter 16 QOS Configuration ........................................................................................................... 16-243
16.1 Brief introduction of QOS ......................................................................................................16-243
16.1.1 Flow.................................................................................................................... 16-243
16.1.2 Traffic classification............................................................................................ 16-243
16.1.3 Access control list .............................................................................................. 16-243
16.1.4 Packet filtration .................................................................................................. 16-243
16.1.5 Flow monitor....................................................................................................... 16-244
16.1.6 Interface speed limitation................................................................................... 16-244
16.1.7 Redirection......................................................................................................... 16-244
16.1.8 Priority mark....................................................................................................... 16-244
16.1.9 Choose interface outputting queue for packet................................................... 16-244
16.1.10 Queue scheduler................................................................................................ 16-244
16.1.11 cos-map ............................................................................................................. 16-245
16.1.12 Flow mirror ......................................................................................................... 16-245
16.1.13 Statistics based on flow...................................................................................... 16-245
16.1.14 Copy packet to CPU .......................................................................................... 16-245
16.2 QOS Configuration................................................................................................................16-245

Содержание

Похожие устройства

Скачать