SGS-6341-Series User Manual
Table Of Contents
- Chapter 1 INTRODUCTION
- Chapter 2 INSTALLATION
- Chapter 3 Switch Management
- Chapter 4 Basic Switch Configuration
- Chapter 5 File System Operations
- Chapter 6 Cluster Configuration
- Chapter 7 Port Configuration
- Chapter 8 Port Isolation Function Configuration
- Chapter 9 Port Loopback Detection Function Configuration
- Chapter 10 ULDP Function Configuration
- Chapter 11 LLDP Function Operation Configuration
- Chapter 12 Port Channel Configuration
- Chapter 13 MTU Configuration
- Chapter 14 EFM OAM Configuration
- Chapter 15 PORT SECURITY
- Chapter 16 DDM Configuration
- Chapter 17 LLDP-MED
- Chapter 18 bpdu-tunnel Configuration
- Chapter 19 EEE Energy-saving Configuration
- Chapter 20 VLAN Configuration
- Chapter 21 MAC Table Configuration
- Chapter 22 MSTP Configuration
- Chapter 23 QoS Configuration
- Chapter 24 Flow-based Redirection
- Chapter 25 Flexible Q-in-Q Configuration
- Chapter 26 Layer 3 Management Configuration
- Chapter 27 ARP Scanning Prevention Function Configuration
- Chapter 28 Prevent ARP Spoofing Configuration
- Chapter 29 ARP GUARD Configuration
- Chapter 30 Gratuitous ARP Configuration
- Chapter 31 DHCP Configuration
- Chapter 32 DHCPv6 Configuration
- Chapter 33 DHCP Option 82 Configuration
- Chapter 34 DHCP Option 60 and option 43
- Chapter 35 DHCPv6 Options 37, 38
- Chapter 36 DHCP Snooping Configuration
- Chapter 37 DHCP Snooping Option 82 Configuration
- Chapter 38 IPv4 Multicast Protocol
- Chapter 39 IPv6 Multicast Protocol
- Chapter 40 Multicast VLAN
- Chapter 41 ACL Configuration
- Chapter 42 802.1x Configuration
- 42.1 Introduction to 802.1x
- 42.2 802.1x Configuration Task List
- 42.3 802.1x Application Example
- 42.4 802.1x Troubleshooting
- Chapter 43 The Number Limitation Function of MAC and IP in Port, VLAN Configuration
- Chapter 44 Operational Configuration of AM Function
- Chapter 45 Security Feature Configuration
- 45.1 Introduction to Security Feature
- 45.2 Security Feature Configuration
- 45.2.1 Prevent IP Spoofing Function Configuration Task Sequence
- 45.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence
- 45.2.3 Anti Port Cheat Function Configuration Task Sequence
- 45.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence
- 45.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence
- 45.3 Security Feature Example
- Chapter 46 TACACS+ Configuration
- Chapter 47 RADIUS Configuration
- Chapter 48 SSL Configuration
- Chapter 49 IPv6 Security RA Configuration
- Chapter 50 MAB Configuration
- Chapter 51 PPPoE Intermediate Agent Configuration
- Chapter 52 Web Portal Configuration
- Chapter 53 VLAN-ACL Configuration
- Chapter 54 SAVI Configuration
- Chapter 55 MRPP Configuration
- Chapter 56 ULPP Configuration
- Chapter 57 ULSM Configuration
- Chapter 58 Mirror Configuration
- Chapter 59 sFlow Configuration
- Chapter 60 RSPAN Configuration
- Chapter 61 ERSPAN
- Chapter 62 SNTP Configuration
- Chapter 63 NTP Function Configuration
- Chapter 64 Summer Time Configuration
- Chapter 65 DNSv4/v6 Configuration
- Chapter 66 Monitor and Debug
- Chapter 67 Reload Switch after Specified Time
- Chapter 68 Debugging and Diagnosis for Packets Received and Sent by CPU
- Chapter 69 Dying Gasp Configuration
- Chapter 70 PoE Configuration
16.4 DDM TROUBLESHOOTING .............................................................................................................. 16-59
CHAPTER 17 LLDP-MED ............................................................................................17-60
17.1 INTRODUCTION TO LLDP-MED ...................................................................................................... 17-60
17.2 LLDP-MED CONFIGURATION TASK SEQUENCE .............................................................................. 17-60
17.3 LLDP-MED EXAMPLE................................................................................................................... 17-62
17.4 LLDP-MED TROUBLESHOOTING ................................................................................................... 17-65
CHAPTER 18 BPDU-TUNNEL CONFIGURATION......................................................18-66
18.1 INTRODUCTION TO BPDU-TUNNEL.................................................................................................... 18-66
18.1.1 bpdu-tunnel function.......................................................................................................... 18-66
18.1.2 Background of bpdu-tunnel............................................................................................... 18-66
18.2 BPDU-TUNNEL CONFIGURATION TASK LIST ...................................................................................... 18-67
18.3 EXAMPLES OF BPDU-TUNNEL.......................................................................................................... 18-67
18.4 BPDU-TUNNEL TROUBLESHOOTING ................................................................................................. 18-69
CHAPTER 19 EEE ENERGY-SAVING CONFIGURATION..........................................19-70
19.1 INTRODUCTION TO EEE ENERGY-SAVING ........................................................................................ 19-70
19.2 EEE ENERGY-SAVING CONFIGURATION LIST.................................................................................... 19-70
19.3 EEE ENERGY-SAVING TYPICAL EXAMPLES ..................................................................................... 19-70
CHAPTER 20 VLAN CONFIGURATION......................................................................20-71
20.1 VLAN CONFIGURATION ................................................................................................................. 20-71
20.1.1 Introduction to VLAN......................................................................................................... 20-71
20.1.2 VLAN Configuration Task List ........................................................................................... 20-72
20.1.3 Typical VLAN Application .................................................................................................. 20-76
20.1.4 Typical Application of Hybrid Port ..................................................................................... 20-78
20.2 DOT1Q-TUNNEL CONFIGURATION ................................................................................................... 20-79
20.2.1 Introduction to Dot1q-tunnel.............................................................................................. 20-79
20.2.2 Dot1q-tunnel Configuration ............................................................................................... 20-81
20.2.3 Typical Applications of the Dot1q-tunnel ........................................................................... 20-81
20.2.4 Dot1q-tunnel Troubleshooting........................................................................................... 20-82
20.3 SELECTIVE Q-IN-Q CONFIGURATION ............................................................................................... 20-83
20.3.1 Introduction to Selective Q-in-Q........................................................................................ 20-83
20.3.2 Selective Q-in-Q Configuration ......................................................................................... 20-83
20.3.3 Typical Applications of Selective Q-in-Q ........................................................................... 20-84
20.3.4 Selective Q-in-Q Troubleshooting ..................................................................................... 20-86
20.4 VLAN TRANSLATION CONFIGURATION............................................................................................ 20-86
20.4.1 Introduction to VLAN Translation ...................................................................................... 20-86
20.4.2 VLAN Translation Configuration........................................................................................ 20-86
20.4.3 Typical Application of VLAN Translation ........................................................................... 20-87
20.4.4 VLAN Translation Troubleshooting ................................................................................... 20-89
4