User Manual UMN:CLI
SURPASS hiD 6615 S223/S323 R1.5
A50010-Y3-C150-2-7619 9
7.6.3.1
Scheduling Algorithm.......................................................................................147
7.6.3.2
Qos Weight......................................................................................................149
7.6.3.3
802.1p Priory-to-queue Mapping.....................................................................149
7.6.3.4
Queue Parameter ............................................................................................150
7.6.3.5
Displaying QoS................................................................................................150
7.6.4
Admin Access Rule..........................................................................................150
7.6.4.1
Rule Creation...................................................................................................151
7.6.4.2
Rule Priority .....................................................................................................151
7.6.4.3
Packet Classification .......................................................................................152
7.6.4.4
Rule Action ......................................................................................................153
7.6.4.5
Applying Rule ..................................................................................................153
7.6.4.6
Modifying and Deleting Rule ...........................................................................154
7.6.4.7
Displaying Rule................................................................................................154
7.7
NetBIOS Filtering.............................................................................................155
7.8
Martian Filtering...............................................................................................156
7.9
Max Host .........................................................................................................156
7.9.1
Max New Hosts ...............................................................................................157
7.10
Port Security ....................................................................................................158
7.10.1
Port Security on Port .......................................................................................158
7.10.2
Port Security Aging ..........................................................................................160
7.11
MAC Table .......................................................................................................161
7.12
MAC Filtering...................................................................................................163
7.12.1
Default Policy of MAC Filtering........................................................................163
7.12.2
Adding Policy of MAC Filter.............................................................................163
7.12.3
Deleting MAC Filter Policy...............................................................................164
7.12.4
Listing of MAC Filter Policy .............................................................................164
7.12.5
Displaying MAC Filter Policy ...........................................................................164
7.13
Address Resolution Protocol (ARP) ................................................................165
7.13.1
ARP Table........................................................................................................165
7.13.1.1
Registering ARP Table.....................................................................................166
7.13.1.2
Displaying ARP Table ......................................................................................166
7.13.2
ARP Alias.........................................................................................................167
7.13.3
ARP Inspection................................................................................................167
7.13.4
Gratuitous ARP................................................................................................169
7.13.5
Proxy-ARP.......................................................................................................169
7.14
ICMP Message Control ...................................................................................169
7.14.1
Blocking Echo Reply Message........................................................................170
7.14.2
Interval for Transmit ICMP Message ...............................................................170
7.14.3
Transmitting ICMP Redirect Message.............................................................172
7.14.4
The policy of unreached messages.................................................................173
7.15
IP TCP Flag Control.........................................................................................173
7.15.1
RST Configuration ...........................................................................................173
7.15.2
SYN Configuration...........................................................................................174
7.16
Packet Dump ...................................................................................................174
7.16.1
Verifying Packet Dump ....................................................................................174
7.16.1.1
Packet Dump by Protocol................................................................................175
7.16.1.2
Packet Dump with Option................................................................................175
7.16.2
Debug Packet Dump .......................................................................................177
7.17
Displaying the usage of the packet routing table.............................................177
8
System Main Functions ...................................................................................178