QTECH
Software Configuration Manual
1-8
12.1.2
ARP probe..........................................................................................................12-163
12.1.3
ARP mediation ...................................................................................................12-163
12.1.4
Variants of the protocol ......................................................................................12-163
12.1.5
Inverse ARP and Reverse ARP .........................................................................12-163
12.2
ARP spoofing ....................................................................................................................... 12-164
12.2.1
How ARP spooing works?..................................................................................12-164
12.2.2
ARP Spoofing/poising Animation .......................................................................12-164
12.3
ARP-Proxy ........................................................................................................................... 12-164
12.4
Anti-flood ARP...................................................................................................................... 12-165
12.5
ARP configuration list ........................................................................................................... 12-165
12.5.1
Add and delete ARP table item ..........................................................................12-165
12.5.2
Display ARP table item.......................................................................................12-165
12.5.3
Configure ARP aging time..................................................................................12-166
12.5.4
Display ARP aging time......................................................................................12-166
12.5.5
Display ARP table item.......................................................................................12-166
12.5.6
Enable/disable ARP anti-flood attack.................................................................12-166
12.5.7
Configure deny action and threshold of ARP anti-flood.....................................12-167
12.5.8
Configure ARP anti-flood recover-time............................................................12-167
12.5.9
ARP anti-flood MAC recover..............................................................................12-167
12.5.10
Display ARP anti-flood attack information.......................................................12-168
12.5.11
Bind blackhole mac generated by arp anti-flood to be general .........................12-168
12.5.12
Enable/disable ARP anti-spoofing......................................................................12-168
12.5.13
Configure unknown ARP packet handling strategy ...........................................12-168
12.5.14
Enable/disable ARP anti-spoofing valid-check ..................................................12-169
12.5.15
Enable/disable ARP anti-spoofing deny-disguiser.............................................12-169
12.5.16
Display ARP anti-spoofing...............................................................................12-169
12.5.17
Configure trust port of ARP anti-attack ..............................................................12-170
Chapter 13
ACL Configuration.............................................................................................................13-171
13.1
ACL Overview ...................................................................................................................... 13-171
13.1.1
ACL Match Order ...............................................................................................13-171
13.1.2
Ways to Apply ACL on a Switch .........................................................................13-172
13.1.3
ACLs Based on Time Ranges............................................................................13-172
13.2
Configuring ACL................................................................................................................... 13-173
13.2.1
Matching order configuration .............................................................................13-173
13.2.2
ACL support .......................................................................................................13-173
13.3
ACL configuration................................................................................................................. 13-174
13.3.1
Configuration list ................................................................................................13-174
13.3.2
Configure time range..........................................................................................13-174
13.3.3
Standard ACL .....................................................................................................13-175
13.3.4
Define extended ACL .........................................................................................13-175
13.3.5
Define layer 2 ACL .............................................................................................13-176
13.3.6
Activate ACL.......................................................................................................13-177
13.3.7
Monitor and maintanence of ACL.......................................................................13-177
Chapter 14
QOS Configuration ...........................................................................................................14-179
14.1
Brief introduction of QOS...................................................................................................... 14-179
14.1.1
Flow ....................................................................................................................14-179
14.1.2
Traffic classification ............................................................................................14-179
14.1.3
Access control list ..............................................................................................14-179
14.1.4
Packet filtration...................................................................................................14-179
14.1.5
Flow monitor.......................................................................................................14-180
14.1.6
Interface speed limitation ...................................................................................14-180
14.1.7
Redirection .........................................................................................................14-180
14.1.8
Priority mark .......................................................................................................14-180