beautypg.com

H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 18

background image

xiii

Displaying and Maintaining the DHCP Client ·······················································································37-2
DHCP Client Configuration Example ······························································································
······37-2

38 DHCP Snooping Configuration ············································································································38-1

DHCP Snooping Overview····················································································································38-1

Function of DHCP Snooping ·········································································································38-1
Application Environment of Trusted Ports·····················································································38-2
DHCP Snooping Support for Option 82·························································································38-3

Configuring DHCP Snooping Basic Functions······················································································38-4
Configuring DHCP Snooping to Support Option 82··············································································38-4

Prerequisites··································································································································38-4
Configuring DHCP Snooping to Support Option 82 ······································································38-4

Displaying and Maintaining DHCP Snooping ·······················································································38-5
DHCP Snooping Configuration Example ····························································································
··38-5

39 BOOTP Client Configuration ················································································································39-1

Introduction to BOOTP Client ···············································································································39-1

BOOTP Application ·······················································································································39-1
Obtaining an IP Address Dynamically ···························································································39-2
Protocols and Standards ········································································································
·······39-2

Configuring an Interface to Dynamically Obtain an IP Address Through BOOTP································39-2
Displaying and Maintaining BOOTP Client Configuration·····································································39-3
BOOTP Client Configuration Example·····························································································
·····39-3

40 ACL Overview ········································································································································40-1

Introduction to ACL ·······························································································································40-1

Introduction····································································································································40-1
Application of ACLs on the Switch ······························································································
··40-1

Introduction to IPv4 ACL ·······················································································································40-2

IPv4 ACL Classification ·················································································································40-2
IPv4 ACL Naming ················································································································
··········40-2
IPv4 ACL Match Order ··················································································································40-3
IPv4 ACL Step ·······························································································································40-4
Effective Period of an IPv4 ACL ································································································
····40-4
IP Fragments Filtering with IPv4 ACL ···························································································40-4

Introduction to IPv6 ACL ·······················································································································40-4

IPv6 ACL Classification ·················································································································40-5
IPv6 ACL Naming ················································································································
··········40-5
IPv6 ACL Match Order ···········································································································
·······40-5
IPv6 ACL Step ·······························································································································40-6
Effective Period of an IPv6 ACL ································································································
····40-6

41 IPv4 ACL Configuration ························································································································41-1

Creating a Time Range·························································································································41-1

Configuration Procedure················································································································41-1
Configuration Examples ················································································································41-2

Configuring a Basic IPv4 ACL···············································································································41-2

Configuration Prerequisites ···········································································································41-2