User's Manual

Table Of Contents
12
Users Manual of CS-6306R
32.1.1
IPv6 Multicast Overview .............................................................................................................. 327
32.1.2
MLD-Snooping Multicast Configuration Tasks ............................................................................. 327
Chapter 33. OAM Configuration 333
OAM Configuration ............................................................................................................................... 333
33.1
33.1.1
OAM Overview ............................................................................................................................. 333
33.1.2
OAM Configuration Task List ....................................................................................................... 336
33.1.3
OAM Configuration Tasks ............................................................................................................ 337
33.1.4
Configuration Example ................................................................................................................ 342
Chapter 34. CFM Configuration 346
Overview ............................................................................................................................................... 346
34.1
34.1.1
Stipulations .................................................................................................................................. 346
CFM Configuration ................................................................................................................................ 346
34.2
34.2.1
CFM Configuration Task List ........................................................................................................ 346
34.2.2
CFM Maintenance Task List......................................................................................................... 346
34.2.3
CFM Configuration ....................................................................................................................... 346
34.2.4
CFM Maintenance ....................................................................................................................... 348
34.2.5
Configuration Example ................................................................................................................ 348
Chapter 35. DHCP-Snooping Configuration 349
DHCP-Snooping Configuration ............................................................................................................. 349
35.1
35.1.1
DHCP-Snooping Configuration Tasks .......................................................................................... 349
Chapter 36. MACFF Configuration 356
MACFF Settings .................................................................................................................................... 356
36.1
36.1.1
Configuration Tasks ..................................................................................................................... 356
Chapter 37. IEEE 1588 Transparent Clock Configuration 360
Task List for IEEE1588 Transparent Clock Configuration ..................................................................... 360
37.1
Tasks for IEEE1588 Transparent Clock Configuration .......................................................................... 360
37.2
Enabling the Transparent Clock ............................................................................................................ 360
37.3
37.3.1
Creating the Transparent Clock Port ........................................................................................... 361
37.3.2
Configuring the Link Delay Calculation Mode .............................................................................. 361
37.3.3
Configuring the Forwarding Mode of Sync Packets ..................................................................... 361
37.3.4
Configuring the Domain Filtration Function ................................................................................. 362
37.3.5
Setting the Transmission Interval of Pdelay_Req Packets .......................................................... 362
PTP TC Configuration Example ............................................................................................................ 363
37.4
Chapter 38.
Layer 2 Tunnel Protocol Configuration 364
Configuring Layer-2 Protocol Tunnel .................................................................................................... 364
38.1
38.1.1
Introduction .................................................................................................................................. 364
38.1.2
Configuring Layer-2 Protocol Tunnel ........................................................................................... 364
38.1.3
Configuration Example of Layer 2 Protocol Tunnel ..................................................................... 364