QTECHSoftwareConfigurationManual
1-2
2.8 MonitorsystembySNMP.........................................................................................................2-32
2.8.1 Briefintroduction ofSNMP.....................................................................................2-32
2.9 SNMPMechanism....................................................................................................................2-32
2.10 SNMPProtocolVersion............................................................................................................2-33
2.11 MIBOverview...........................................................................................................................2-33
2.12 SNMPConfiguration.................................................................................................................2-33
2.12.1 Configurecommunitynameand accessingright...................................................2-34
2.12.2 ConfiguresysContact.............................................................................................2-34
2.12.3 ConfigureTrapdestination host adress.................................................................2-35
2.12.4 ConfiguresysLocation............................................................................................2-35
2.12.5 ConfiguresysName................................................................................................2-35
2.12.6 Configurenotify......................................................................................................2-36
2.12.7 Configureengine id................................................................................................2-36
2.12.8 Configureview........................................................................................................2-37
2.12.9 Configuregroup.....................................................................................................2-37
2.12.10 Configureuser........................................................................................................2-38
2.13 Enable/disabledlfforwordpacket.............................................................................................2-39
2.14 CPUAlarmConfiguration..........................................................................................................2-39
2.14.1 Briefintroduction ofCPUalarm.............................................................................2-39
2.14.2 CPUalarmconfiguration list..................................................................................2-39
2.14.3 Enable/disableCPUalarm.....................................................................................2-39
2.14.4 ConfigureCPUbusyorunbusythreshold.............................................................2-40
2.14.5 DisplayCPUalarminformation..............................................................................2-40
2.15 Anti-DOSAttack.......................................................................................................................2-40
2.15.1 IPsegment anti-attack...........................................................................................2-40
Chapter3 MACaddress tablemanagement.........................................................................................3-41
3.1 Introduction toBridging.............................................................................................................3-41
3.2 MajorFunctionalitiesofBridges................................................................................................3-41
3.2.1 Maintainingthe bridgetable...................................................................................3-41
3.2.2 Forwardingand filtering..........................................................................................3-43
3.3 Briefintroduction ofMACaddress tablemanagement...............................................................3-45
3.4 MACaddress tablemanagementlist........................................................................................3-45
3.5 ConfiguresystemMACaddress aging time..............................................................................3-45
3.6 ConfigureMACaddressitem....................................................................................................3-46
3.6.1 Add MACaddress..................................................................................................3-46
3.6.2 Add blackholeMACaddress..................................................................................3-46
3.6.3 DeleteMACaddress item......................................................................................3-47
3.6.4 DisplayMACaddress table....................................................................................3-47
3.6.5 Enable/disableMACaddress learning...................................................................3-47
3.6.6 DisplayMACaddress learning...............................................................................3-47
3.6.7 ModifyMACaddress learningmode......................................................................3-48
Chapter4 Port Configuration.................................................................................................................4-49
4.1 Port configuration introduction..................................................................................................4-49
4.2 Port Configuration....................................................................................................................4-49
4.2.1 Port related configuration.......................................................................................4-49
4.2.2 Enterinterfaceconfiguration mode........................................................................4-49
4.2.3 Enable/disablespecified interface.........................................................................4-49
4.2.4 Configureinterfaceduplexmode andspeed rate..................................................4-50
4.2.5 InterfacePriorityConfiguration..............................................................................4-50
4.2.6 Interfacedescription configuration.........................................................................4-50
4.2.7 Ingress/egress bandwidth-controlconfiguration....................................................4-51
4.2.8 Enable/disableVLANfiltration ofreceivingpacket ofinterface.............................4-51
4.2.9 Interfaceingress acceptable-frameconfiguration..................................................4-51