PLANET XGS3-24040 User Manual
User's manual
Table of contents
Document Outline
- Chapter 1 INTRODUTION
- Chapter 2 INSTALLATION
- Chapter 3 Switch Management
- Chapter 4 Basic Switch Configuration
- Chapter 5 File System Operations
- Chapter 6 Cluster Configuration
- Chapter 7 Port Configuration
- Chapter 8 Port Isolation Function Configuration
- Chapter 9 Port Loopback Detection Function Configuration
- Chapter 10 ULDP Function Configuration
- Chapter 11 LLDP Function Operation Configuration
- Chapter 12 Port Channel Configuration
- Chapter 13 Jumbo Configuration
- Chapter 14 VLAN Configuration
- Chapter 15 MAC Table Configuration
- Chapter 16 MSTP Configuration
- Chapter 17 QoS Configuration
- Chapter 18 PBR Configuration
- Chapter 19 IPv6 PBR Configuration
- Chapter 20 Flow-based Redirection
- Chapter 21 Layer 3 Forward Configuration
- Chapter 22 ARP Scanning Prevention Function Configuration
- Chapter 23 Prevent ARP, ND Spoofing Configuration
- Chapter 24 ARP GUARD Configuration
- Chapter 25 ARP Local Proxy Configuration
- Chapter 26 Gratuitous ARP Configuration
- Chapter 27 ND Snooping Configuration
- Chapter 28 DHCP Configuration
- Chapter 29 DHCPv6 Configuration
- Chapter 30 DHCP option 82 Configuration
- Chapter 31 DHCP Snooping Configuration
- Chapter 32 DHCPv6 Snooping Configuration
- Chapter 33 Routing Protocol Overview
- Chapter 34 Static Route
- Chapter 35 RIP
- Chapter 36 RIPng
- Chapter 37 OSPF
- Chapter 38 OSPFv3
- Chapter 39 BGP
- 39.1 Introduction to BGP
- 39.2 BGP Configuration Task List
- 39.3 Configuration Examples of BGP
- 39.3.1 Examples 1: configure BGP neighbor
- 39.3.2 Examples 2: configure BGP aggregation
- 39.3.3 Examples 3: configure BGP community attributes
- 39.3.4 Examples 4: configure BGP confederation
- 39.3.5 Examples 5: configure BGP route reflector
- 39.3.6 Examples 6: configure MED of BGP
- 39.3.7 Examples 7: example of BGP VPN
- 39.4 BGP Troubleshooting
- Chapter 40 MBGP4+
- Chapter 41 Black Hole Routing Manual
- Chapter 42 ECMP Configuration
- Chapter 43 IPv4 Multicast Protocol
- 43.1 IPv4 Multicast Protocol Overview
- 43.2 PIM-DM
- 43.3 PIM-SM
- 43.4 MSDP Configuration
- 43.4.1 Introduction to MSDP
- 43.4.2 Brief Introduction to MSDP Configuration Tasks
- 43.4.3 Configuration of MSDP Basic Function
- 43.4.4 Configuration of MSDP Entities
- 43.4.5 Configuration of Delivery of MSDP Packet
- 43.4.6 Configuration of Parameters of SA-cache
- 43.4.7 MSDP Configuration Examples
- 43.4.8 MSDP Troubleshooting
- 43.5 ANYCAST RP Configuration
- 43.6 PIM-SSM
- 43.7 DVMRP
- 43.8 DCSCM
- 43.9 IGMP
- 43.10 IGMP Snooping
- 43.11 IGMP Proxy Configuration
- Chapter 44 IPv6 Multicast Protocol
- Chapter 45 Multicast VLAN
- Chapter 46 ACL Configuration
- Chapter 47 802.1x Configuration
- 47.1 Introduction to 802.1x
- 47.1.1 The Authentication Structure of 802.1x
- 47.1.2 The Work Mechanism of 802.1x
- 47.1.3 The Encapsulation of EAPOL Messages
- 47.1.4 The Encapsulation of EAP Attributes
- 47.1.5 Web Authentication Proxy based on 802.1x
- 47.1.6 The Authentication Methods of 802.1x
- 47.1.7 The Extension and Optimization of 802.1x
- 47.1.8 The Features of VLAN Allocation
- 47.2 802.1x Configuration Task List
- 47.3 802.1x Application Example
- 47.4 802.1x Troubleshooting
- 47.1 Introduction to 802.1x
- Chapter 48 The Number Limitation Function of Port, MAC in VLAN and IP Configuration
- 48.1 Introduction to the Number Limitation Function of Port, MAC in VLAN and IP
- 48.2 The Number Limitation Function of Port, MAC in VLAN and IP Configuration Task Sequence
- 48.3 The Number Limitation Function of Port, MAC in VLAN and IP Typical Examples
- 48.4 The Number Limitation Function of Port, MAC in VLAN and IP Troubleshooting Help
- Chapter 49 Operational Configuration of AM Function
- Chapter 50 Security Feature Configuration
- 50.1 Introduction to Security Feature
- 50.2 Security Feature Configuration
- 50.2.1 Prevent IP Spoofing Function Configuration Task Sequence
- 50.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence
- 50.2.3 Anti Port Cheat Function Configuration Task Sequence
- 50.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence
- 50.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence
- 50.3 Security Feature Example
- Chapter 51 TACACS+ Configuration
- Chapter 52 RADIUS Configuration
- Chapter 53 SSL Configuration
- Chapter 54 IPv6 Security RA Configuration
- Chapter 55 VLAN-ACL Configuration
- Chapter 56 RSPAN Configuration
- Chapter 57 sFlow Configuration
- Chapter 58 VRRP Configuration
- Chapter 59 IPv6 VRRPv3 Configuration
- Chapter 60 MRPP Configuration
- Chapter 61 ULPP Configuration
- Chapter 62 ULSM Configuration
- Chapter 63 SNTP Configuration
- Chapter 64 NTP Function Configuration
- Chapter 65 DNSv4/v6 Configuration
- Chapter 66 Monitor and Debug
- Chapter 67 Reload Switch after Specified Time
- Chapter 68 Debugging and Diagnosis for Packets Received and Sent by CPU
- Chapter 69 SWITCH OPERATION
- Chapter 70 TROUBLE SHOOTING
- Chapter 71 APPENDEX A
- Chapter 72 GLOSSARY
- EC Declaration of Conformity