PoE Profile Configuration...................................................................................................................... 50-1
Configuring PoE Profile ................................................................................................................. 50-1
Displaying PoE Profile Configuration .................................................................................................... 50-3
PoE Profile Configuration Example....................................................................................................... 50-3
PoE Profile Application Example................................................................................................... 50-3
51
UDP Helper Configuration..................................................................................................................... 51-1
Introduction to UDP Helper ................................................................................................................... 51-1
Configuring UDP Helper ....................................................................................................................... 51-2
Displaying and Maintaining UDP Helper............................................................................................... 51-3
UDP Helper Configuration Example ..................................................................................................... 51-3
Cross-Network Computer Search Through UDP Helper............................................................... 51-3
52
SNMP Configuration .............................................................................................................................. 52-1
SNMP Overview.................................................................................................................................... 52-1
SNMP Operation Mechanism........................................................................................................ 52-1
SNMP Versions ............................................................................................................................. 52-1
Supported MIBs............................................................................................................................. 52-2
Configuring Basic SNMP Functions...................................................................................................... 52-2
Configuring Trap-Related Functions ..................................................................................................... 52-4
Configuring Basic Trap Functions ................................................................................................. 52-4
Configuring Extended Trap Function............................................................................................. 52-5
Enabling Logging for Network Management......................................................................................... 52-5
Displaying SNMP .................................................................................................................................. 52-6
SNMP Configuration Example .............................................................................................................. 52-6
SNMP Configuration Example....................................................................................................... 52-6
53
RMON Configuration.............................................................................................................................. 53-1
Introduction to RMON ........................................................................................................................... 53-1
Working Mechanism of RMON...................................................................................................... 53-1
Commonly Used RMON Groups ................................................................................................... 53-2
RMON Configuration............................................................................................................................. 53-3
Displaying RMON.................................................................................................................................. 53-4
RMON Configuration Example.............................................................................................................. 53-4
54
NTP Configuration ................................................................................................................................. 54-1
Introduction to NTP ............................................................................................................................... 54-1
Applications of NTP ....................................................................................................................... 54-1
Implementation Principle of NTP................................................................................................... 54-2
NTP Implementation Modes .......................................................................................................... 54-3
NTP Configuration Task List ................................................................................................................. 54-6
Configuring NTP Implementation Modes .............................................................................................. 54-6
Configuring NTP Server/Client Mode ............................................................................................ 54-7
Configuring the NTP Symmetric Peer Mode ................................................................................. 54-7
Configuring NTP Broadcast Mode................................................................................................. 54-8
Configuring NTP Multicast Mode................................................................................................... 54-9
Configuring Access Control Right ....................................................................................................... 54-10
Configuration Prerequisites ......................................................................................................... 54-10
Configuration Procedure.............................................................................................................. 54-10
Configuring NTP Authentication.......................................................................................................... 54-11
Configuration Prerequisites ......................................................................................................... 54-11
xviii