Huawei SmartAX MA5616 Configuration Manual page 7

Multi-service access module
Table of Contents

Advertisement

SmartAX MA5616 Multi-service Access Module
Configuration Guide
3.8.1.1 Configuring the Adaptive Clock Reference Source.......................................................................67
3.8.1.2 Configuring the Line Clock Reference Source...............................................................................68
3.8.2 Configuring the Priority of the System Clock.........................................................................................68
3.9 Configuring the System Time...........................................................................................................................69
3.9.1 Configuring the NTP Time......................................................................................................................69
3.9.1.1 (Optional) Configuring NTP Authentication..................................................................................70
3.9.1.2 Configuring the NTP Broadcast Mode...........................................................................................71
3.9.1.3 Configuring the NTP Multicast Mode............................................................................................73
3.9.1.4 Configuring the NTP Unicast Server Mode...................................................................................75
3.9.1.5 Configuring the NTP Peer Mode....................................................................................................77
3.10 Configuring the User Security........................................................................................................................79
3.10.1 Configuring Anti-Theft and Roaming of User Account Through PITP................................................80
3.10.3 Configuring the Anti-IP Address Attack...............................................................................................85
3.10.4 Configuring the Anti-MAC Address Attack ........................................................................................86
3.11 Configuring System Security..........................................................................................................................88
3.11.1 Configuring Firewall.............................................................................................................................89
3.11.2 Preventing the Access of Invalid Users.................................................................................................91
3.11.3 Preventing the Attack of Invalid Users..................................................................................................92
3.12 Configuring AAA...........................................................................................................................................94
3.12.1 Configuring the Local AAA..................................................................................................................95
3.12.2 Configuring the Remote AAA (Based on the RADIUS Protocol)........................................................97
3.12.3 Configuring the Remote AAA (Based on the HWTACACS Protocol)..............................................100
Users)..............................................................................................................................................................104
Users)..............................................................................................................................................................107
3.13 Configuring the ACL for Packet Filtering....................................................................................................110
3.13.1 Configuring the Basic ACL for Packet Filtering.................................................................................112
3.13.2 Configuring the Advanced ACL for Packet Filtering.........................................................................113
3.13.3 Configuring the Link Layer ACL for Packet Filtering........................................................................114
3.14 Configuring QoS...........................................................................................................................................115
3.14.1 Configuring Traffic Management........................................................................................................116
3.14.1.1 Configuring Traffic Management Based on Service Port..........................................................116
3.14.1.2 Configuring Rate Limitation on an Ethernet Port......................................................................119
3.14.1.3 Configuring User-based Rate Limitation...................................................................................119
3.14.1.4 Configuring Traffic Suppression................................................................................................121
3.14.2 Configuring Queue Scheduling...........................................................................................................123
3.14.2.1 Configuring the Queue Scheduling Mode..................................................................................123
3.14.2.3 Configuring the Queue Depth.....................................................................................................126
3.14.3 Configuring Traffic Management Based on ACL Rules.....................................................................128
3.14.3.1 Controlling the Traffic Matching an ACL Rule.........................................................................128
Issue 04 (2011-10-30)
Copyright © Huawei Technologies Co., Ltd.
Contents
vi

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents