Operation Manual - Network Protocol
Quidway S3500 Series Ethernet Switches Table of Contents
Huawei Technologies Proprietary
iii
Chapter 6 DHCP Snooping Configuration .................................................................................. 6-1
6.1 DHCP Snooping Overview ................................................................................................ 6-1
6.2 Configuring DHCP Snooping............................................................................................. 6-2
6.2.1 DHCP Snooping Configuration Task....................................................................... 6-2
6.2.2 DHCP Snooping Configuration Example ................................................................ 6-2
Chapter 7 BOOTP Client Configuration ...................................................................................... 7-1
7.1 Overview of BOOTP Client................................................................................................ 7-1
7.2 BOOTP Client Configuration.............................................................................................. 7-1
7.2.1 Configuring a VLAN Interface to Obtain the IP Address Using BOOTP................. 7-1
7.3 Displaying and Debugging BOOTP Client......................................................................... 7-2
Chapter 8 Access Management Configuration .......................................................................... 8-1
8.1 Access Management Overview ......................................................................................... 8-1
8.2 Configure Access Management......................................................................................... 8-2
8.2.1 Enable Access Management Function ................................................................... 8-2
8.2.2 Configure the Access IP Address Pool Based on the Physical Port....................... 8-2
8.2.3 Configure Layer 2 Isolation between Ports............................................................. 8-3
8.2.4 Configuring Port Isolation on a Per-VLAN Basis..................................................... 8-3
8.2.5 Configure Port, IP Address and MAC Address Binding.......................................... 8-4
8.2.6 Enable/Disable Access Management Trap............................................................. 8-6
8.3 Display and debug Access Management .......................................................................... 8-6
8.4 Access Management Configuration Example.................................................................... 8-6
Chapter 9 IP Performance Configuration.................................................................................... 9-1
9.1 IP Performance Configuration ........................................................................................... 9-1
9.1.1 Configure TCP Attributes ........................................................................................ 9-1
9.2 debug IP Performance....................................................................................................... 9-2
9.3 Troubleshoot IP Performance............................................................................................ 9-2