42.7.3 Configuring the Minimum Interval for Tranmission of Security Events ........42-3
42.7.4 Configuring the Address Binding Switch Supported by the Port..................42-3
42.8 GSN Configuration Display ......................................................................................................42-4
42.8.1 Showing smp server ....................................................................................42-4
42.8.2 Showing security event interval ...................................................................42-4
42.9 Precuations for GSN Configuration .........................................................................................42-4
42.9.1 Number of GSN-Supporting Entries ............................................................42-4
42.9.2 Functions in Conflict with the GSN ..............................................................42-5
42.9.3 Other Precuations for Using the GSN ..........................................................42-5
43 Dynamic ARP Inspection Configuration ............................................................................................ 43-1
43.1 Understanding DAI ...................................................................................................................43-1
43.1.1 Understanding ARP Spoofing Attack ............................................................43-1
43.1.2 Understanding DAI and ARP Spoofing Attacks ............................................43-2
43.1.3 Understanding DAI Global Switches ............................................................43-2
43.1.4 Interface Trust Status and Network Security ................................................43-3
43.1.5 Restricting Rate of ARP Packets .................................................................43-3
43.2 Configuring DAI ........................................................................................................................43-3
43.2.1 Enabling Global DAI Function ......................................................................43-4
43.2.2 Enabling the DAI Packet Check Function for Specified VLAN ....................43-4
43.2.3 Setting the Trust Status of Ports ..................................................................43-4
43.2.4 Set Maximum Receiving Rate of ARP Packets for a Port ............................43-5
43.2.5 Related Configuration of DHCP Snooping Database ..................................43-5
43.3 Showing DAI Configuration ......................................................................................................43-6
43.3.1 Showing DAI Enabling Status of VLAN ........................................................43-6
43.3.2 Showing DAI Configuration Status of Each Layer 2 Interface .....................43-6
44 Access Control List Configuration ..................................................................................................... 44-1
44.1 Overview ..................................................................................................................................44-1
44.1.1 Access Control List Introduction ..................................................................44-1
44.1.2 Why to Configure Access Lists ....................................................................44-2
44.1.3 When to Configure Access Lists ..................................................................44-2
44.1.4 Input/Output ACL, Filtering Domain Template and Rules ............................44-3
44.2 Configuring IP Access Lists .....................................................................................................44-5
44.2.1 Guide to Configure IP Access Lists ..............................................................44-5
44.2.2 Configuring IP Access List ...........................................................................44-6
44.2.3 Configuration of Showing IP Access Lists ...................................................44-7
44.2.4 IP Access List Example ................................................................................44-8
44.3 Configuring MAC Extended Access List ..................................................................................44-9
44.3.1 Configuration of MAC Extended Access List ...............................................44-9