beautypg.com

H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 10

background image

iv

Configuring an SNMP User .........................................................................................................18-10

Configuring SNMP Trap Function ...............................................................................................18-12

SNMP Configuration Examples ..........................................................................................................18-13

19 Loopback................................................................................................................................................19-1

Overview ...............................................................................................................................................19-1

Loopback Operation..............................................................................................................................19-1

Configuration Guidelines.......................................................................................................................19-3

20 MAC Address Configuration ................................................................................................................20-1

Overview ...............................................................................................................................................20-1

Configuring MAC Addresses.................................................................................................................20-2

Configuring a MAC Address Entry ................................................................................................20-2

Setting the Aging Time of MAC Address Entries ..........................................................................20-4

MAC Address Configuration Examples.................................................................................................20-4

21 VLAN Configuration ..............................................................................................................................21-1

Overview ...............................................................................................................................................21-1

Introduction to VLAN .....................................................................................................................21-1

How VLAN Works..........................................................................................................................21-2

Types of VLAN ..............................................................................................................................21-3

Introduction to Port-Based VLAN ..................................................................................................21-3

Configuring a VLAN ..............................................................................................................................21-4

Configuration Task List..................................................................................................................21-4

Creating a VLAN............................................................................................................................21-4

Modifying a VLAN..........................................................................................................................21-5

Modifying a Port.............................................................................................................................21-6

VLAN Configuration Example ...............................................................................................................21-8

Configuration Guidelines.....................................................................................................................21-11

22 ARP Configuration.................................................................................................................................22-1

ARP Overview.......................................................................................................................................22-1

ARP Function ................................................................................................................................22-1

ARP Message Format ...................................................................................................................22-1

ARP Operation ..............................................................................................................................22-2

ARP Table .....................................................................................................................................22-3

Configuring ARP Entries .......................................................................................................................22-4

Displaying ARP Entries .................................................................................................................22-4

Creating a Static ARP Entry ..........................................................................................................22-4

Static ARP Configuration Example................................................................................................22-5

Gratuitous ARP .....................................................................................................................................22-8

Introduction to Gratuitous ARP......................................................................................................22-8

Configuring Gratuitous ARP ..........................................................................................................22-8

23 ARP Attack Defense Configuration .....................................................................................................23-1

ARP Detection.......................................................................................................................................23-1

Introduction to ARP Detection .......................................................................................................23-1

Configuring ARP Detection ...........................................................................................................23-3

Other ARP Attack Defense Functions...................................................................................................23-4