![Comelit IPSWC162A Скачать руководство пользователя страница 25](http://html1.mh-extra.com/html/comelit/ipswc162a/ipswc162a_manual_2640304025.webp)
25
time to remove packet VLAN10 tag, in the form of ordinary package sent to pc2, pc1 - > p2
is VLAN10 walking at this time
Again to analyze pc2 gave pc1 package process, data from the pc2, by inter0/2 PVID
VLAN20 encapsulation VLAN20 labeled into switch, switch found system e0/1 allows
VLAN by 20 data, so the data is forwarded to the system e0/1, because the system e0/1
on the VLAN is untagged 20, then switches remove packets on VLAN20 tag at this time, in
the form of ordinary package sent to pc1, pc2 at this time - > pc1 is VLAN 20
4.4 Fault/Safety
In the navigation bar select
“Fault/Safety”
, you can set
Anti Attack, Channel Detection
and
ACL Access Control
configuration.
4.4.1 Anti attack
4.4.1.1 Anti DHCP attack
In the navigation bar select
“Fault/Safety>Anti Attack>Anti DHCP Attack”
, open the
DHCP anti-attack function, intercepting counterfeit DHCP server and address attack
packets ban kangaroo DHCP server, as the following picture:
【
Instructions
】
DHCP trusted port configuration, select the port as a trusted port. Prohibit DHCP for
address, select the port and save, you can disable this feature for the port.
Open DHCP attack prevention function, need to set the DHCP protective VLAN
simultaneously, other functions to take effect.
【
Configuration Example
】
Such as: 1.dhcp snooping open