Huawei Quidway S2700 Series Configuration Manual page 10

Hide thumbs Also See for Quidway S2700 Series:
Table of Contents

Advertisement

Quidway S2700 Series Ethernet Switches
Configuration Guide - Security
7.4.1 Example for Configuring MFF..............................................................................................................147
8 Traffic Suppression Configuration........................................................................................151
8.1 Introduction to Traffic Suppression................................................................................................................152
8.2 Traffic Suppression Features Supported by the S2700..................................................................................152
8.3 Configuring Traffic Suppression....................................................................................................................152
8.3.1 Establishing the Configuration Task.....................................................................................................152
8.3.2 Configuring Traffic Suppression on an Interface..................................................................................153
8.3.3 Checking the Configuration...................................................................................................................153
8.4 Configuration Examples.................................................................................................................................154
8.4.1 Example for Configuring Traffic Suppression......................................................................................154
9 ACL Configuration....................................................................................................................156
9.1 Introduction to the ACL.................................................................................................................................157
9.2 Classification of ACLs Supported by the S2700............................................................................................157
9.3 Configuring an ACL.......................................................................................................................................158
9.3.1 Establishing the Configuration Task.....................................................................................................158
9.3.2 Creating an ACL....................................................................................................................................159
9.3.3 (Optional) Setting the Time Range When an ACL Takes Effect..........................................................160
9.3.4 (Optional) Configuring the Description of an ACL..............................................................................160
9.3.5 Configuring a Basic ACL......................................................................................................................161
9.3.6 Configuring an Advanced ACL.............................................................................................................161
9.3.7 Configuring a Layer 2 ACL...................................................................................................................162
9.3.8 (Optional) Setting the Step Between ACL Rules..................................................................................163
9.3.9 Checking the Configuration...................................................................................................................164
9.4 Configuring ACL6..........................................................................................................................................164
9.4.1 Establishing the Configuration Task.....................................................................................................164
9.4.2 Creating an ACL6..................................................................................................................................165
9.4.3 (Optional) Creating the Time Range of the ACL6................................................................................166
9.4.4 Configuring a Basic ACL6....................................................................................................................166
9.4.5 Configuring an Advanced ACL6...........................................................................................................167
9.4.6 Checking the Configuration...................................................................................................................168
9.5 Configuration Examples.................................................................................................................................169
9.5.1 Example for Configuring a Basic ACL.................................................................................................169
9.5.2 Example for Configuring an Advanced ACL........................................................................................171
9.5.3 Example for Configuring a Layer 2 ACL..............................................................................................175
9.5.4 Example for Configuring an ACL6 to Control FTP User Access.........................................................178
10 ND Snooping Configuration.................................................................................................180
10.1 ND Snooping Overview...............................................................................................................................181
10.2 ND Snooping Features Supported by the S2700..........................................................................................181
10.3 Configuring ND Snooping............................................................................................................................182
10.3.1 Establishing the Configuration Task...................................................................................................182
10.3.2 Enabling ND Snooping........................................................................................................................183
Issue 01 (2011-07-15)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
ix

Advertisement

Table of Contents
loading

Table of Contents