Panasonic NN46240-502 User Manual

Page 3

Attention! The text in this document has been recognized automatically. To view the original document, you can use the "Original mode".

Advertising
background image

Nortel Secure Router 8000 Series

Configuration - LAN Access and MAN Access

Contents

About this document...................................................................................................................1

1 LAN access overview............................................................................................................1-1

1.1 Introduction....................................................................................................................................................1-2

1.1.1 LAN interfaces.................................................................................................................................... 1-2

1.1.2 Link layer protocols............................................................................................................................ 1-3

1.2 Configuring interface parameters..................................................................................................................1-3

1.2.1 Establishing the configuration task.....................................................................................................1-3

1.2.2 Entering the interface view................................................................................................................. 1-5

1.2.3 Configuring the interface description.................................................................................................1-5

1.2.4 Configuring the interval of flow statistics.......................................................................................... 1-5

1.2.5 Enabling the interface..........................................................................................................................1-6

1.2.6 Checking the configuration.................................................................................................................1-7

1.3 Maintaining interfaces................................................................................................................................... 1-8

1.3.1 Clearing interface statistics.................................................................................................................1-8

1.3.2 Debugging the interface...................................................................................................................... 1-8

2 MAC address table configuration...................................................................................... 2-1

2.1 Introduction....................................................................................................................................................2-2

2.1.1 MAC address table overview..............................................................................................................2-2

2.1.2 Classification of MAC address entries.................................................................................................2-2

2.1.3 MAC address learning limit................................................................................................................2-2

2.2 Configuring a MAC address table.................................................................................................................2-3

2.2.1 Establishing the configuration task.....................................................................................................2-3

2.2.2 Changing MAC address entries..........................................................................................................2-3

2.2.3 Setting the aging time of a MAC address table....................................................................................2-4

2.2.4 Checking the configuration.................................................................................................................2-4

2.3 Configuring the MAC address learning limit................................................................................................2-5

2.3.1 Establishing the configuration task.....................................................................................................2-5

2.3.2 Configuring MAC address learning limit rules based on a VSI..........................................................2-6

2.3.3 Checking the configuration.................................................................................................................2-7

2.4 Configuration examples.................................................................................................................................2-7

2.4.1 Example of configuring a MAC address table.................................................................................2-7

Issue 5.3 (30 March 2009)

Nortel Networks Inc.

i

Advertising