Configuring the Policy Routing .......................................................................................................................................................74
Viewing the Routing Table .................................................................................................................................................................75
Network Requirements ..........................................................................................................................................................76
Network Topology ....................................................................................................................................................................76
Configuration Scheme ...........................................................................................................................................................76
Configuration Procedure ......................................................................................................................................................77
Network Requirements ..........................................................................................................................................................79
Network Topology ....................................................................................................................................................................79
Configuration Scheme ...........................................................................................................................................................79
Configuration Procedure ......................................................................................................................................................80
Network Requirements ..........................................................................................................................................................80
Network Topology ....................................................................................................................................................................81
Configuration Scheme ...........................................................................................................................................................81
Configuration Procedure ......................................................................................................................................................81
Adding IP-MAC Binding Entries ........................................................................................................................................88
Enable Anti ARP Spoofing ....................................................................................................................................................91
Configuring Attack Defense .............................................................................................................................................................93
Configuring MAC Filtering ..................................................................................................................................................................95
Configuring Access Control .............................................................................................................................................................96