User's Manual

Table Of Contents
13
Users Manual of GPL-8000
38.1.1
Introduction .................................................................................................................................. 342
38.1.2
Configuring Layer 2 Protocol Tunnel ........................................................................................... 342
38.1.3
Configuration Example of Layer 2 Protocol Tunnel ..................................................................... 342
Loopback Detection Configuration 343
Chapter 39. ............................................................................................................................................................. 343
Setting Loopback Detection .................................................................................................................. 343
39.1.1
Introduction of Loopback Detection ............................................................................................. 343
39.1.2
Loopback Detection Configuration Tasks .................................................................................... 344
39.1.3
Setting Loopback Detection ......................................................................................................... 344
39.1.4
Configuration Example ................................................................................................................ 347
QoS Configuration 349
Chapter 40. ............................................................................................................................................................. 349
QoS Configuration ................................................................................................................................ 349
40.1.1
QoS Overview .............................................................................................................................. 349
40.1.2
QoS Configuration Task List ........................................................................................................ 352
40.1.3
QoS Configuration Tasks ............................................................................................................. 352
40.1.4
QoS Configuration Example ........................................................................................................ 360
DoS Attack Prevention Configuration 361
Chapter 41. ............................................................................................................................................................. 361
DoS Attack Prevention Configuration .................................................................................................... 361
41.1.1
DoS Attack Overview ................................................................................................................... 361
41.1.2
DoS Attack Prevention Configuration Task List............................................................................ 362
41.1.3
DoS Attack Prevention Configuration Tasks ................................................................................ 362
41.1.4
DoS Attack Prevention Configuration Example ........................................................................... 363
Attack Prevention Configuration 364
Chapter 42. ............................................................................................................................................................. 364
Attack Prevention Configuration ........................................................................................................... 364
42.1.1
Overview ...................................................................................................................................... 364
42.1.2
Attack Prevention Configuration Tasks ........................................................................................ 364
42.1.3
Attack Prevention Configuration .................................................................................................. 364
42.1.4
Attack Prevention Configuration Example ................................................................................... 365
Network Protocol Configuration 366
Chapter 43. ............................................................................................................................................................. 366
Configuring IP Addressing..................................................................................................................... 366
43.1.1
IP Introduction .............................................................................................................................. 366
43.1.2
Configuring IP Address Task List ................................................................................................. 367
43.1.3
Configuring IP Address ................................................................................................................ 368
Configuring NAT .................................................................................................................................... 374
43.2.1
Introduction .................................................................................................................................. 374