Content
11. GVRP CONFIGURATION ......................................................................... 72
11.1 Brief Introduction to GVRP ............................................................................................ 72
11.2 Configuring GVRP .......................................................................................................... 73
11.2.1 Brief Introduction to GVRP Configuration .................................................................. 73
11.2.2 Startup GVRP ............................................................................................................ 73
11.3 Configuring VLAN Forwarded by GVRP ...................................................................... 73
11.3.1 Displaying and Debugging ......................................................................................... 74
11.3.2 GVRP Configuration Examples ................................................................................. 74
12. ARP CONFIGURATION ........................................................................... 79
12.1 ARP Overview ................................................................................................................. 79
12.1.1 ARP Function ............................................................................................................. 79
12.1.2 ARP Message Format ............................................................................................... 80
12.2 Configuring ARP Attack Spoofing ................................................................................ 81
12.2.1 Brief Introduction to ARP Spoofing ............................................................................ 81
12.2.2 ARP Anti-Spoofing Protection .................................................................................... 81
12.2.3 Configuring Anti-Spoofing .......................................................................................... 82
12.2.4 Configuring ARP Packet Source MAC Address Consistency Check ........................ 83
12.2.5 Configuring Default of Anti-Spoofing ......................................................................... 83
12.2.6 Displaying and Maintain Anti-Spoofing ...................................................................... 83
12.3 Configuring against ARP Flood .................................................................................... 83
12.3.1 ARP Flood .................................................................................................................. 83
12.3.2 Configuring against ARP Flood ................................................................................. 84
12.3.3 Configuring against ARP Flood ................................................................................. 84
12.3.4 Displaying and Maintain against ARP Flood.............................................................. 85
13. IGMP SNOOPING .................................................................................... 86
13.1 Brief Introduction to IGMP Snooping ........................................................................... 86
13.2 IGMP Snooping Configuration ...................................................................................... 86
13.2.1 Brief Configuration of IGMP Snooping ...................................................................... 86
13.2.2 Enable IGMP Snooping ............................................................................................. 87
13.2.3 Configuring IGMP Snooping Timer ............................................................................ 87
13.2.4 Configuring Port Fast-Leave ...................................................................................... 87
13.2.5 Configuring Number of Multicast Group Allowed Learning ....................................... 88
13.2.6 Configuring IGMP Snooping Querier ......................................................................... 88
13.2.7 Configuring IGMP Snooping Multicast Learning Strategy ......................................... 89
13.2.8 Configuring IGMP Snooping Router-Port .................................................................. 89
13.2.9 Configuring IGMP Snooping Port Multicast VLAN .................................................... 90
13.2.10 Configuring Host Port Record MAC Functions ........................................................ 90