EasyManuals Logo

Zte ZXR10 5250-28TC Product Description

Zte ZXR10 5250-28TC
40 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #18 background imageLoading...
Page #18 background image
ZXR10 5250 Product Description
12
2013 ZTE CORPORATION. All rights reserved
ZTE Confidential Proprietary
Source switch: The switch of the monitored port makes L2 forwarding of the traffic,
which needs to be mirrored, at Remote-probe VLAN L2 and forwards it to
intermediate switch or destination switch.
Intermediate switch: The switch between source switch and destination switch in
the network transports the mirroring traffic to the next intermediate switch or
destination switch via Remote-probe VLAN. If source switch and destination
switch are directly connected, there will be no intermediate switch.
Destination switch: The switch of destination port for remote mirroring forwards
the mirroring traffic received from Remote-probe VLAN to the monitoring
equipment via the mirroring destination port.
3.2.6 Global counter
ZXR10 5250 has unique global counter. The port and flow to be monitored can be bound
to a separate global counter. The specific flow can be decided according to flow
classification. For example, monitor a specific source IP and destination IP. After binding,
global counter separately counts the packets matching the flow.
Global counter provides the carriers with an effective way to monitor network traffic status,
which may be for a specific traffic of each user, so as to offer more data for network
structure planning.
3.2.7 IP source guard
IP source guard is a policy control technology. Based upon dynamic DHCP snooping
table entry or manual static table entry, it is mainly responsible for checking if IP+MAC
the same as DHCP snooping table entry or manual static table entry. If they are not the
same, the message will be judged as illegal. Then it will be discarded or sent to CPU.
3.2.8 Dynamic ARP Inspection (DAI)
ARP attack is the most commonly seen means in the network. It has two ways: One is to
transmit a lot of ARP packets which is beyond normal processing capability and break
down the equipment; the other is to transmit faked ARP packets and make the equipment
learn wrong table items, thus the packets of a normal user are wrongly forwarded to the
hacker faking the ARP packets and let him get private information of the user.
DAI service can effectively process ARP attack. After initiating DAI, the equipment can
restrict the number of ARP sent by the port, which guarantees adequate processing
capability of the equipment. Also, DAI service can check the legality of the received ARP
message according to user table entry generated dynamically. When the received ARP
message does not accord with the user dynamic table entry of this port, this message will
be dropped to make sure the correctness of the forwarding table entry.

Table of Contents

Other manuals for Zte ZXR10 5250-28TC

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Zte ZXR10 5250-28TC and is the answer not in the manual?

Zte ZXR10 5250-28TC Specifications

General IconGeneral
ModelZXR10 5250-28TC
CategorySwitch
ManageableYes
VLANs4K
Jumbo Frame9K
Storage Temperature-40°C to 70°C
Power SupplyAC 100-240V
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z, IEEE 802.3x, IEEE 802.1Q, IEEE 802.1p, IEEE 802.1w, IEEE 802.1d, IEEE 802.1s
Routing ProtocolStatic Routing
Operating Humidity10% to 90% (non-condensing)
Storage Humidity5% to 95% (non-condensing)

Related product manuals