User Manual
12
Users Manual of XGS-6350-24X4C
33.1.4
Configuration Example ................................................................................................................ 318
Chapter 34. CFM and Y1731 Configuration 322
Overview ............................................................................................................................................... 322
34.1
34.1.1
Stipulations .................................................................................................................................. 322
CFM Configuration ................................................................................................................................ 322
34.2
34.2.1
CFM Configuration Task List ........................................................................................................ 322
34.2.2
CFM Maintenance Task List......................................................................................................... 322
34.2.3
CFM Configuration ....................................................................................................................... 323
34.2.4
CFM Maintenance ....................................................................................................................... 324
34.2.5
Configuration Example ................................................................................................................ 324
Y1731 Configuration ............................................................................................................................. 325
34.3
34.3.1
Configuration Task List................................................................................................................. 325
Chapter 35. DHCP-Snooping Configuration 327
DHCP-Snooping Configuration ............................................................................................................. 327
35.1
35.1.1
DHCP-Snooping Configuration Tasks .......................................................................................... 327
Chapter 36. MACFF Configuration 334
MACFF Settings .................................................................................................................................... 334
36.1
36.1.1
Configuration Tasks ..................................................................................................................... 334
Chapter 37. IEEE 1588 Transparent Clock Configuration 338
Task List for IEEE1588 Transparent Clock Configuration ..................................................................... 338
37.1
Tasks for IEEE1588 Transparent Clock Configuration .......................................................................... 338
37.2
Enabling the Transparent Clock ............................................................................................................ 338
37.3
37.3.1
Creating the Transparent Clock Port ........................................................................................... 339
37.3.2
Configuring the Link Delay Calculation Mode .............................................................................. 339
37.3.3
Configuring the Forwarding Mode of Sync Packets ..................................................................... 339
37.3.4
Configuring the Domain Filtration Function ................................................................................. 340
37.3.5
Setting the Transmission Interval of Pdelay_Req Packets .......................................................... 340
PTP TC Configuration Example ............................................................................................................ 341
37.4
Chapter 38. Layer 2 Tunnel Protocol Configuration 342
Configuring Layer-2 Protocol Tunnel .................................................................................................... 342
38.1
38.1.1
Introduction .................................................................................................................................. 342
38.1.2
Configuring Layer-2 Protocol Tunnel ........................................................................................... 342
38.1.3
Configuration Example of Layer 2 Protocol Tunnel ..................................................................... 342
Chapter 39. Loopback Detection Configuration 344
Setting Loopback Detection .................................................................................................................. 344
39.1
39.1.1
Introduction of Loopback Detection ............................................................................................. 344
39.1.2
Loopback Detection Configuration Tasks .................................................................................... 345