QTECH QSW-2800 Инструкция по настройке User Manual

Page 9

Advertising
background image

+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1

9

34.2.1 Introduction to DCSCM ......................................................................... 34-242

34.2.2 DCSCM Configuration Task List ........................................................... 34-242

34.2.3 DCSCM Configuration Examples ......................................................... 34-245

34.2.4 DCSCM Troubleshooting ...................................................................... 34-246

34.3

IGMP

S

NOOPING

................................................................................................. 34-246

34.3.1 Introduction to IGMP Snooping ............................................................ 34-246

34.3.2 IGMP Snooping Configuration Task List ............................................. 34-247

34.3.3 IGMP Snooping Examples .................................................................... 34-249

34.3.4 IGMP Snooping Troubleshooting ......................................................... 34-251

CHAPTER 35 IPV6 MULTICAST PROTOCOL .......................................... 35-252

35.1

MLD

S

NOOPING

................................................................................................... 35-252

35.1.1 Introduction to MLD Snooping ............................................................. 35-252

35.1.2 MLD Snooping Configuration Task ...................................................... 35-252

35.1.3 MLD Snooping Examples ...................................................................... 35-254

35.1.4 MLD Snooping Troubleshooting .......................................................... 35-257

CHAPTER 36 MULTICAST VLAN ............................................................. 36-258

36.1

I

NTRODUCTIONS TO

M

ULTICAST

VLAN .................................................................. 36-258

36.2

M

ULTICAST

VLAN

C

ONFIGURATION

T

ASK

L

IST

...................................................... 36-258

36.3

M

ULTICAST

VLAN

E

XAMPLES

............................................................................... 36-259

CHAPTER 37 ACL CONFIGURATION ....................................................... 37-262

37.1

I

NTRODUCTION TO

ACL ........................................................................................ 37-262

37.1.1 Access-list .............................................................................................. 37-262

37.1.2 Access-group ......................................................................................... 37-262

37.1.3 Access-list Action and Global Default Action ..................................... 37-262

37.2

ACL

C

ONFIGURATION

T

ASK

L

IST

........................................................................... 37-263

37.3

ACL

E

XAMPLE

..................................................................................................... 37-275

37.4

ACL

T

ROUBLESHOOTING

...................................................................................... 37-279

CHAPTER 38 802.1X CONFIGURATION .................................................. 38-281

38.1

I

NTRODUCTION TO

802.1

X

..................................................................................... 38-281

38.1.1 The Authentication Structure of 802.1x ............................................... 38-281

38.1.2 The Work Mechanism of 802.1x............................................................ 38-283

38.1.3 The Encapsulation of EAPOL Messages ............................................. 38-283

38.1.4 The Encapsulation of EAP Attributes .................................................. 38-285

38.1.5 The Extension and Optimization of 802.1x .......................................... 38-290

Advertising