User's Manual

18
42.1.16 Configuring Forward-L3-to-Mrouter of IGMP Snooping to Forward the Data Packets to the
Routing Port .................................................................................................................................... 321
42.1.17 Configuring Sensitive mode and Value for IGMP Snooping .............................................. 322
42.1.18 Configuring IGMP Snooping’s v3-leave-check Function ................................................... 322
42.1.19 Configuring IGMP Snooping’s forward-wrongiif-within-vlan Function ................................ 323
42.1.20 Configuring IGMP-snooping’s IPACL function at port ........................................................ 323
42.1.21 Configuring maximum multicast IP address quantity function at IGMP-snooping’s port ... 323
42.1.22 Monitoring and Maintaining IGMP-Snooping ..................................................................... 324
42.1.23 IGMP-Snooping Configuration Example ............................................................................ 325
CHAPTER 43 IGMP PROXY CONFIGURATION ............................................................ 327
43.1 IGMP PROXY CONFIGURATION TASKS ............................................................................................... 327
43.1.1 Enabling/Disabling IGMP-Proxy ........................................................................................... 327
43.1.2 Adding/Deleting VLAN Agent Relationship .......................................................................... 327
43.1.3 Adding/Deleting Static Multicast Source Entries .................................................................. 328
43.1.4 Monitoring and Maintaining IGMP-Proxy ............................................................................. 328
43.1.5 IGMP Proxy Configuration Example .................................................................................... 329
CHAPTER 44 CHAPTER 1 DHCP SNOOPING CONFIGURATION ............................... 330
44.1 IGMP SNOOPING CONFIGURATION TASKS ......................................................................................... 330
44.1.1 Enabling/Disabling DHCP Snooping .................................................................................... 330
44.1.2 Enabling DHCP Snooping in a VLAN .................................................................................. 331
44.1.3 Enabling DHCP Anti-attack in a VLAN. ................................................................................ 331
44.1.4 Setting an Interface to a DHCP-Trusting Interface .............................................................. 331
44.1.5 Enabling/Disabling Binding Table Fast Update Function ..................................................... 332
44.1.6 Enabling DAI in a VLAN ....................................................................................................... 332
44.1.7 Setting an Interface to an ARP-Trusting Interface ............................................................... 332
44.1.8 Enabling Source IP Address Monitoring in a VLAN ............................................................. 332
44.1.9 Setting an Interface to the One Which is Trusted by IP Source Address Monitoring ........... 333
44.1.10 Setting DHCP Snooping Option 82 .................................................................................... 333
44.1.11 Setting the Policy of DHCP Snooping Option82 Packets .................................................. 335
44.1.12 Setting the TFTP Server for Backing Up Interface Binding ............................................... 335
44.1.13 Setting a File Name for Interface Binding Backup ............................................................. 336
44.1.14 Setting the Interval for Checking Interface Binding Backup ............................................... 336
44.1.15 Setting Interface Binding Manually .................................................................................... 337
44.1.16 Monitoring and Maintaining DHCP-Snooping .................................................................... 337
44.1.17 Example of DHCP Snooping Configuration ....................................................................... 338
CHAPTER 45 CONFIGURING LAYER 2 PROTOCOL TUNNEL .................................... 341
45.1 INTRODUCTION ................................................................................................................................. 341
45.2 CONFIGURING LAY E R 2 PROTOCOL TUNNEL....................................................................................... 341
45.3 CONFIGURATION EXAMPLE OF LAY E R 2 PROTOCOL TUNNEL ............................................................... 341
CHAPTER 46 QOS CONFIGURATION ........................................................................... 343