QTECH
Software Configuration Manual
1-2
2.8
Monitor system by SNMP ......................................................................................................... 2-32
2.8.1
Brief introduction of SNMP.....................................................................................2-32
2.9
SNMP Mechanism.................................................................................................................... 2-32
2.10
SNMP Protocol Version ............................................................................................................ 2-33
2.11
MIB Overview........................................................................................................................... 2-33
2.12
SNMP Configuration................................................................................................................. 2-33
2.12.1
Configure community name and accessing right...................................................2-34
2.12.2
Configure sysContact.............................................................................................2-34
2.12.3
Configure Trap destination host adress .................................................................2-35
2.12.4
Configure sysLocation............................................................................................2-35
2.12.5
Configure sysName................................................................................................2-35
2.12.6
Configure notify ......................................................................................................2-36
2.12.7
Configure engine id ................................................................................................2-36
2.12.8
Configure view........................................................................................................2-37
2.12.9
Configure group .....................................................................................................2-37
2.12.10
Configure user........................................................................................................2-38
2.13
Enable/disable dlf forword packet ............................................................................................. 2-39
2.14
CPU Alarm Configuration.......................................................................................................... 2-39
2.14.1
Brief introduction of CPU alarm .............................................................................2-39
2.14.2
CPU alarm configuration list ..................................................................................2-39
2.14.3
Enable/disable CPU alarm.....................................................................................2-39
2.14.4
Configure CPU busy or unbusy threshold .............................................................2-40
2.14.5
Display CPU alarm information..............................................................................2-40
2.15
Anti-DOS Attack ....................................................................................................................... 2-40
2.15.1
IP segment anti-attack ...........................................................................................2-40
Chapter 3
MAC address table management.........................................................................................3-41
3.1
Introduction to Bridging............................................................................................................. 3-41
3.2
Major Functionalities of Bridges................................................................................................ 3-41
3.2.1
Maintaining the bridge table...................................................................................3-41
3.2.2
Forwarding and filtering..........................................................................................3-43
3.3
Brief introduction of MAC address table management............................................................... 3-45
3.4
MAC address table management list ........................................................................................ 3-45
3.5
Configure system MAC address aging time .............................................................................. 3-45
3.6
Configure MAC address item.................................................................................................... 3-46
3.6.1
Add MAC address ..................................................................................................3-46
3.6.2
Add blackhole MAC address..................................................................................3-46
3.6.3
Delete MAC address item ......................................................................................3-47
3.6.4
Display MAC address table....................................................................................3-47
3.6.5
Enable/disable MAC address learning...................................................................3-47
3.6.6
Display MAC address learning...............................................................................3-47
3.6.7
Modify MAC address learning mode......................................................................3-48
Chapter 4
Port Configuration.................................................................................................................4-49
4.1
Port configuration introduction .................................................................................................. 4-49
4.2
Port Configuration .................................................................................................................... 4-49
4.2.1
Port related configuration.......................................................................................4-49
4.2.2
Enter interface configuration mode........................................................................4-49
4.2.3
Enable/disable specified interface .........................................................................4-49
4.2.4
Configure interface duplex mode and speed rate..................................................4-50
4.2.5
Interface Priority Configuration ..............................................................................4-50
4.2.6
Interface description configuration.........................................................................4-50
4.2.7
Ingress/egress bandwidth-control configuration ....................................................4-51
4.2.8
Enable/disable VLAN filtration of receiving packet of interface.............................4-51
4.2.9
Interface ingress acceptable-frame configuration..................................................4-51