User's Manual
Table Of Contents
- Chapter 1 INTRODUCTION
- Chapter 2 INSTALLATION
- Chapter 3 Switch Management
- Chapter 4 Basic Switch Configuration
- Chapter 5 File System Operations
- Chapter 6 Cluster Configuration
- Chapter 7 Port Configuration
- Chapter 8 Port Isolation Function Configuration
- Chapter 9 Port Loopback Detection Function Configuration
- Chapter 10 ULDP Function Configuration
- Chapter 11 LLDP Function Operation Configuration
- Chapter 12 Port Channel Configuration
- Chapter 13 Jumbo Configuration
- Chapter 14 EFM OAM Configuration
- Chapter 15 VLAN Configuration
- Chapter 16 MAC Table Configuration
- Chapter 17 MSTP Configuration
- Chapter 18 QoS Configuration
- Chapter 19 Flow-based Redirection
- Chapter 20 Egress QoS Configuration
- Chapter 21 Flexible Q-in-Q Configuration
- Chapter 22 Layer 3 Forward Configuration
- Chapter 23 ARP Scanning Prevention Function Configuration
- Chapter 24 Prevent ARP, ND Spoofing Configuration
- Chapter 25 ARP GUARD Configuration
- Chapter 26 ARP Local Proxy Configuration
- Chapter 27 Gratuitous ARP Configuration
- Chapter 28 Keepalive Gateway Configuration
- Chapter 29 DHCP Configuration
- Chapter 30 DHCPv6 Configuration
- Chapter 31 DHCP option 82 Configuration
- Chapter 32 DHCPv6 option37, 38
- Chapter 33 DHCP Snooping Configuration
- Chapter 34 Routing Protocol Overview
- Chapter 35 Static Route
- Chapter 36 RIP
- Chapter 37 RIPng
- Chapter 38 OSPF
- Chapter 39 OSPFv3
- Chapter 40 BGP
- 40.1 Introduction to BGP
- 40.2 BGP Configuration Task List
- 40.3 Configuration Examples of BGP
- 40.3.1 Examples 1: configure BGP neighbor
- 40.3.2 Examples 2: configure BGP aggregation
- 40.3.3 Examples 3: configure BGP community attributes
- 40.3.4 Examples 4: configure BGP confederation
- 40.3.5 Examples 5: configure BGP route reflector
- 40.3.6 Examples 6: configure MED of BGP
- 40.3.7 Examples 7: example of BGP VPN
- 40.4 BGP Troubleshooting
- Chapter 41 MBGP4+
- Chapter 42 Black Hole Routing Manual
- Chapter 43 GRE Tunnel Configuration
- Chapter 44 ECMP Configuration
- Chapter 45 BFD
- Chapter 46 BGP GR
- Chapter 47 OSPF GR
- Chapter 48 IPv4 Multicast Protocol
- 48.1 IPv4 Multicast Protocol Overview
- 48.2 PIM-DM
- 48.3 PIM-SM
- 48.4 MSDP Configuration
- 48.4.1 Introduction to MSDP
- 48.4.2 Brief Introduction to MSDP Configuration Tasks
- 48.4.3 Configuration of MSDP Basic Function
- 48.4.4 Configuration of MSDP Entities
- 48.4.5 Configuration of Delivery of MSDP Packet
- 48.4.6 Configuration of Parameters of SA-cache
- 48.4.7 MSDP Configuration Examples
- 48.4.8 MSDP Troubleshooting
- 48.5 ANYCAST RP Configuration
- 48.6 PIM-SSM
- 48.7 DVMRP
- 48.8 DCSCM
- 48.9 IGMP
- 48.10 IGMP Snooping
- 48.11 IGMP Proxy Configuration
- Chapter 49 IPv6 Multicast Protocol
- Chapter 50 Multicast VLAN
- Chapter 51 ACL Configuration
- Chapter 52 802.1x Configuration
- 52.1 Introduction to 802.1x
- 52.2 802.1x Configuration Task List
- 52.3 802.1x Application Example
- 52.4 802.1x Troubleshooting
- Chapter 53 The Number Limitation Function of Port, MAC in VLAN and IP Configuration
- 53.1 Introduction to the Number Limitation Function of Port, MAC in VLAN and IP
- 53.2 The Number Limitation Function of Port, MAC in VLAN and IP Configuration Task Sequence
- 53.3 The Number Limitation Function of Port, MAC in VLAN and IP Typical Examples
- 53.4 The Number Limitation Function of Port, MAC in VLAN and IP Troubleshooting Help
- Chapter 54 Operational Configuration of AM Function
- Chapter 55 TACACS+ Configuration
- Chapter 56 RADIUS Configuration
- Chapter 57 SSL Configuration
- Chapter 58 IPv6 Security RA Configuration
- Chapter 59 VLAN-ACL Configuration
- Chapter 60 MAB Configuration
- Chapter 61 PPPoE Intermediate Agent Configuration
- Chapter 62 SAVI Configuration
- Chapter 63 Web Portal Configuration
- Chapter 64 VRRP Configuration
- Chapter 65 IPv6 VRRPv3 Configuration
- Chapter 66 MRPP Configuration
- Chapter 67 ULPP Configuration
- Chapter 68 ULSM Configuration
- Chapter 69 Mirror Configuration
- Chapter 70 RSPAN Configuration
- Chapter 71 sFlow Configuration
- Chapter 72 SNTP Configuration
- Chapter 73 NTP Function Configuration
- Chapter 74 DNSv4/v6 Configuration
- Chapter 75 Summer Time Configuration
- Chapter 76 Monitor and Debug
- Chapter 77 Reload Switch after Specified Time
- Chapter 78 Debugging and Diagnosis for Packets Received and Sent by CPU
- Chapter 79 VSF
- Chapter 80 PoE Configuration
- Chapter 81 SWITCH OPERATION
- Chapter 82 TROUBLESHOOTING
- Chapter 83 APPENDIX A
- Chapter 84 GLOSSARY
Configuration Guide of SGS-6341-Series
1-15
CHAPTER 58 IPV6 SECURITY RA CONFIGURATION .................................................58-1
58.1 INTRODUCTION TO IPV6 SECURITY RA .............................................................................................. 58-1
58.2 IPV6 SECURITY RA CONFIGURATION TASK SEQUENCE ...................................................................... 58-1
58.3 IPV6 SECURITY RA TYPICAL EXAMPLES ........................................................................................... 58-2
58.4 IPV6 SECURITY RA TROUBLESHOOTING HELP .................................................................................. 58-2
CHAPTER 59 VLAN-ACL CONFIGURATION ...............................................................59-1
59.1 INTRODUCTION TO VLAN-ACL ........................................................................................................ 59-1
59.2 VLAN-ACL CONFIGURATION TASK LIST .......................................................................................... 59-1
59.3 VLAN-ACL CONFIGURATION EXAMPLE ............................................................................................ 59-3
59.4 VLAN-ACL TROUBLESHOOTING ...................................................................................................... 59-4
CHAPTER 60 MAB CONFIGURATION .........................................................................60-5
60.1 INTRODUCTION TO MAB ................................................................................................................... 60-5
60.2 MAB CONFIGURATION TASK LIST ..................................................................................................... 60-5
60.3 MAB EXAMPLE ............................................................................................................................... 60-7
60.4 MAB TROUBLESHOOTING ................................................................................................................ 60-9
CHAPTER 61 PPPOE INTERMEDIATE AGENT CONFIGURATION ..........................61-10
61.1 INTRODUCTION TO PPPOE INTERMEDIATE AGENT ........................................................................... 61-10
61.1.1 Brief Introduction to PPPoE .............................................................................................. 61-10
61.1.2 Introduction to PPPoE IA .................................................................................................. 61-10
61.2 PPPOE INTERMEDIATE AGENT CONFIGURATION TASK LIST ............................................................. 61-14
61.3 PPPOE INTERMEDIATE AGENT TYPICAL APPLICATION ..................................................................... 61-15
61.4 PPPOE INTERMEDIATE AGENT TROUBLESHOOTING ........................................................................ 61-16
CHAPTER 62 SAVI CONFIGURATION .......................................................................62-17
62.1 INTRODUCTION TO SAVI ................................................................................................................. 62-17
62.2 SAVI CONFIGURATION ................................................................................................................... 62-17
62.3 SAVI TYPICAL APPLICATION .......................................................................................................... 62-21
62.4 SAVI TROUBLESHOOTING .............................................................................................................. 62-23
CHAPTER 63 WEB PORTAL CONFIGURATION ........................................................63-24
63.1 INTRODUCTION TO WEB PORTAL AUTHENTICATION .......................................................................... 63-24
63.2 WEB PORTAL AUTHENTICATION CONFIGURATION TASK LIST ............................................................ 63-24
63.3 WEB PORTAL AUTHENTICATION TYPICAL EXAMPLE ......................................................................... 63-26
63.4 WEB PORTAL AUTHENTICATION TROUBLESHOOTING ....................................................................... 63-27