10
12.1
I
NTRODUCTION TO
SNTP.................................................................................. 360
12.2
C
OMMAND FOR
SNTP ...................................................................................... 361
12.2.1 clock timezone............................................................................................ 361
12.2.2 sntp server.................................................................................................. 361
12.2.3 sntp poll ...................................................................................................... 362
12.2.4 debug sntp.................................................................................................. 362
12.2.5 show sntp ................................................................................................... 362
12.3
T
YPICAL
SNTP
C
ONFIGURATION
E
XAMPLES
...................................................... 363
12.4
W
EB
M
ANAGEMENT
.......................................................................................... 363
12.4.1 SNMP/NTP server configuration................................................................. 363
12.4.2 Request interval configuration .................................................................... 364
12.4.3 Time difference ........................................................................................... 364
12.4.4 Show SNTP ................................................................................................ 364
CHAPTER 13 PREVENT ARP, ND SPOOFING CONFIGURATION ............................ 365
13.1
O
VERVIEW
....................................................................................................... 365
13.1.1 ARP ( Address Resolution Protocol) ........................................................... 365
13.1.2 ARP Spoofing ............................................................................................. 365
13.1.3 How to prevent void ARP/ND Spoofing for our Layer 3 Switch................... 366
13.2
P
REVENT
ARP,
ND
S
POOFING CONFIGURATION
................................................. 366
13.2.1 Prevent ARP, ND Spoofing Configuration Task List .................................... 366
13.3
C
OMMANDS
F
OR
P
REVENTING
ARP,
ND
S
POOFING
........................................... 367
13.3.1 ip arp-security updateprotect ...................................................................... 367
13.3.2 ipv6 nd-security updateprotect.................................................................... 368
13.3.3 ip arp-security learnprotect ......................................................................... 368
13.3.4 ipv6 nd learnprotect .................................................................................... 368
13.3.5 ip arp-security convert ................................................................................ 369
13.3.6 ipv6 nd-security convert.............................................................................. 369
13.3.7 clear ip arp dynamic ................................................................................... 369
13.3.8 clear ipv6 nd dynamic................................................................................. 369
13.4
P
REVENT
ARP,
ND
S
POOFING
E
XAMPLE
........................................................... 370
CHAPTER 14 ROUTING PROTOCOL ......................................................................... 372
14.1
R
OUTING
P
ROTOCOL
O
VERVIEW
....................................................................... 372
14.1.1 Routing Table.............................................................................................. 373
14.2
IP
R
OUTING
P
OLICY
......................................................................................... 374
14.2.1 Introduction To Routing Policy .................................................................... 374
14.2.2 IP Routing Policy Configuration Task List ................................................... 376
14.2.3 Command For Routing Policy..................................................................... 380
14.2.4 Configuration Examples ............................................................................. 392