H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 18
xiii
Displaying and Maintaining the DHCP Client ·······················································································37-2
DHCP Client Configuration Example ····································································································37-2
38 DHCP Snooping Configuration ············································································································38-1
DHCP Snooping Overview····················································································································38-1
Function of DHCP Snooping ·········································································································38-1
Application Environment of Trusted Ports·····················································································38-2
DHCP Snooping Support for Option 82·························································································38-3
Prerequisites··································································································································38-4
Configuring DHCP Snooping to Support Option 82 ······································································38-4
Displaying and Maintaining DHCP Snooping ·······················································································38-5
DHCP Snooping Configuration Example ······························································································38-5
39 BOOTP Client Configuration ················································································································39-1
Introduction to BOOTP Client ···············································································································39-1
BOOTP Application ·······················································································································39-1
Obtaining an IP Address Dynamically ···························································································39-2
Protocols and Standards ···············································································································39-2
Configuring an Interface to Dynamically Obtain an IP Address Through BOOTP································39-2
Displaying and Maintaining BOOTP Client Configuration·····································································39-3
BOOTP Client Configuration Example··································································································39-3
40 ACL Overview ········································································································································40-1
Introduction to ACL ·······························································································································40-1
Introduction····································································································································40-1
Application of ACLs on the Switch ································································································40-1
Introduction to IPv4 ACL ·······················································································································40-2
IPv4 ACL Classification ·················································································································40-2
IPv4 ACL Naming ··························································································································40-2
IPv4 ACL Match Order ··················································································································40-3
IPv4 ACL Step ·······························································································································40-4
Effective Period of an IPv4 ACL ····································································································40-4
IP Fragments Filtering with IPv4 ACL ···························································································40-4
Introduction to IPv6 ACL ·······················································································································40-4
IPv6 ACL Classification ·················································································································40-5
IPv6 ACL Naming ··························································································································40-5
IPv6 ACL Match Order ··················································································································40-5
IPv6 ACL Step ·······························································································································40-6
Effective Period of an IPv6 ACL ····································································································40-6
41 IPv4 ACL Configuration ························································································································41-1
Creating a Time Range·························································································································41-1
Configuration Procedure················································································································41-1
Configuration Examples ················································································································41-2
Configuring a Basic IPv4 ACL···············································································································41-2
Configuration Prerequisites ···········································································································41-2