User Manual

13
Users Manual of XGS-6350-24X4C
39.1.3
Setting Loopback Detection ......................................................................................................... 345
39.1.4
Configuration Example ................................................................................................................ 348
Chapter 40. QoS Configuration 350
QoS Configuration ................................................................................................................................ 350
40.1
40.1.1
QoS Overview .............................................................................................................................. 350
40.1.2
QoS Configuration Task List ........................................................................................................ 353
40.1.3
QoS Configuration Tasks ............................................................................................................. 353
40.1.4
QoS Configuration Example ........................................................................................................ 361
Chapter 41. DoS Attack Prevention Configuration 362
DoS Attack Prevention Configuration .................................................................................................... 362
41.1
41.1.1
DoS Attack Overview ................................................................................................................... 362
41.1.2
DoS Attack Prevention Configuration Task List............................................................................ 363
41.1.3
DoS Attack Prevention Configuration Tasks ................................................................................ 363
41.1.4
DoS Attack Prevention Configuration Example ........................................................................... 364
Chapter 42. Attack Prevention Configuration 365
Attack Prevention Configuration ........................................................................................................... 365
42.1
42.1.1
Overview ...................................................................................................................................... 365
42.1.2
Attack Prevention Configuration Tasks ........................................................................................ 365
42.1.3
Attack Prevention Configuration .................................................................................................. 365
42.1.4
Attack Prevention Configuration Example ................................................................................... 366
Chapter 43. Network Protocol Configuration 367
Configuring IP Addressing..................................................................................................................... 367
43.1
43.1.1
IP Introduction .............................................................................................................................. 367
43.1.2
Configuring IP Address Task List ................................................................................................. 368
43.1.3
Configuring IP Address ................................................................................................................ 369
Configuring NAT .................................................................................................................................... 375
43.2
43.2.1
Introduction .................................................................................................................................. 375
43.2.2
NAT Configuration Task List ......................................................................................................... 376
43.2.3
NAT Configuration Task ............................................................................................................... 377
43.2.4
NAT Configuration Example ......................................................................................................... 385
Configuring DHCP ................................................................................................................................ 388
43.3
43.3.1
Introduction .................................................................................................................................. 388
43.3.2
Configuring DHCP Client ............................................................................................................. 389
43.3.3
Configuring DHCP Server ............................................................................................................ 390
IP Service Configuration ....................................................................................................................... 394
43.4
43.4.1
Configuring IP Service ................................................................................................................. 394
43.4.2
Configuring Access List ............................................................................................................... 399
43.4.3
Configuring IP Access List Based on Physical Port ..................................................................... 402
Chapter 44. IP ACL Application Configuration 406