R3721-F3210-F3171-HP High-End Firewalls Network Management Configuration Guide-6PW101

Table Of Contents
19
Ste
p
Command
Remarks
3. Set the MTU.
mtu size
Optional.
1500 bytes by default.
The MTU value of the 10GE interface
on the interface module of the box
type firewall is in the range of 46 to
156 0 by t e s .
The 10 GE interface on the inline card
of the firewall supports jumbo frame,
and the MTU value of the interface is
in the range of 46 to 9216 bytes.
Configuring an Ethernet interface to operate in promiscuous mode
An Ethernet interface usually receives only packets with matched destination MAC addresses. After you
configure an Ethernet interface to operate in promiscuous mode, however, the interface no longer checks
the MAC addresses in received packets. Rather, it receives all Ethernet packets with correct format. You
may need to configure a network listening port to operate in promiscuous mode.
To configure an Ethernet interface to operate in promiscuous mode:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter Ethernet interface view.
interface interface-type
interface-number
N/A
3. Configure the Ethernet
interface to operate in
promiscuous mode.
promiscuous
By default, an Ethernet interface does
not operate in promiscuous mode.
Configuring a loopback interface
Introduction to the loopback interface
A loopback interface is a software-only virtual interface. It delivers the following benefits.
The physical layer state and link layer protocols of a loopback interface are always up unless the
loopback interface is manually shut down.
You can assign a loopback interface an IP address with an all-F mask to save the IP address
resources. When you assign an IPv4 address whose mask is not 32-bit, the system automatically
changes the mask into a 32-bit mask. When you assign an IPv6 address whose mask is not 128-bit,
the system automatically changes the mask into a 128-bit mask.
You can enable routing protocols on a loopback interface, and a loopback interface can send and
receive routing protocol packets.
Because of the benefits mentioned above, loopback interfaces are widely used in the following
scenarios.
You can configure a loopback interface address as the source address of the IP packets that the
device generates. Because loopback interface addresses are stable unicast addresses, they are
usually used as device identifications. Therefore, when you configure a rule on an authentication or
security server to permit or deny packets generated by a device, you can simplify the rule by
configuring it to permit or deny packets carrying the loopback interface address identifying the