Huawei Quidway S3700 Series Configuration Manual page 12

Hide thumbs Also See for Quidway S3700 Series:
Table of Contents

Advertisement

Quidway S3700 Series Ethernet Switches
Configuration Guide - Security
9.5.2 Example for Configuring the Storm Control Function..........................................................................221
10 ACL Configuration..................................................................................................................223
10.1 Introduction to the ACL...............................................................................................................................224
10.2 Classification of ACLs Supported by the S3700..........................................................................................224
10.3 Configuring an ACL.....................................................................................................................................225
10.3.1 Establishing the Configuration Task...................................................................................................225
10.3.2 Creating an ACL..................................................................................................................................226
10.3.3 (Optional) Setting the Time Range When an ACL Takes Effect........................................................227
10.3.4 (Optional) Configuring the Description of an ACL............................................................................227
10.3.5 Configuring a Basic ACL....................................................................................................................228
10.3.6 Configuring an Advanced ACL...........................................................................................................228
10.3.7 Configuring a Layer 2 ACL.................................................................................................................229
10.3.8 Creating a User-defined ACL..............................................................................................................230
10.3.9 (Optional) Setting the Step Between ACL Rules................................................................................231
10.3.10 Checking the Configuration...............................................................................................................231
10.4 Configuring ACL6........................................................................................................................................232
10.4.1 Establishing the Configuration Task...................................................................................................233
10.4.2 Creating an ACL6................................................................................................................................233
10.4.3 (Optional) Creating the Time Range of the ACL6..............................................................................234
10.4.4 Configuring a Basic ACL6..................................................................................................................235
10.4.5 Configuring an Advanced ACL6.........................................................................................................235
10.4.6 Checking the Configuration.................................................................................................................236
10.5 Configuration Examples...............................................................................................................................237
10.5.1 Example for Configuring a Basic ACL...............................................................................................237
10.5.2 Example for Configuring an Advanced ACL......................................................................................239
10.5.3 Example for Configuring a Layer 2 ACL............................................................................................244
10.5.4 Example for Configuring a Customized ACL.....................................................................................246
10.5.5 Example for Configuring an ACL6 to Control FTP User Access.......................................................248
11 ND Snooping Configuration.................................................................................................251
11.1 ND Snooping Overview...............................................................................................................................252
11.2 ND Snooping Features Supported by the S3700..........................................................................................252
11.3 Configuring ND Snooping............................................................................................................................253
11.3.1 Establishing the Configuration Task...................................................................................................253
11.3.2 Enabling ND Snooping........................................................................................................................254
11.3.3 Configuring an Interface as the Trusted Interface...............................................................................255
11.3.5 Checking the Configuration.................................................................................................................257
11.4 Maintaining ND Snooping............................................................................................................................258
11.4.1 Clearing the Prefix Management Table...............................................................................................258
11.4.2 Resetting the ND Dynamic Binding Table..........................................................................................258
11.5 Configuration Examples...............................................................................................................................259
Issue 01 (2011-07-15)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
xi

Advertisement

Table of Contents
loading

Table of Contents