Operation Manual - Link Layer Protocol
H3C SecPath F1800-A Firewall Table of Contents
i
Table of Contents
Chapter 1 VLAN Configuration ....................................................................................................4-1
1.1 Introduction to VLAN..........................................................................................................4-1
1.1.1 The Potential Problems In LAN Interconnecting.....................................................4-1
1.1.2 Why Using VLAN.....................................................................................................4-2
1.1.3 VLAN Aggregation ..................................................................................................4-3
1.2 Configuring VLAN..............................................................................................................4-4
1.2.1 Creating an Ethernet Sub-interface ........................................................................4-5
1.2.2 Creating a VLAN and Entering VLAN View ............................................................4-5
1.2.3 Entering VLAN Interface View When a VLAN Is Created.......................................4-5
1.2.4 Adding a Port...........................................................................................................4-5
1.2.5 Configuring a Trunk Port.........................................................................................4-6
1.2.6 Setting Sub-interface Encapsulation Type and Related VLAN ID..........................4-6
1.3 Displaying and Debugging VLAN ......................................................................................4-6
1.4 Typical Example for Configuring VLAN............................................................................. 4-7
Chapter 2 PPP Configuration.....................................................................................................4-10
2.1 PPP Overview..................................................................................................................4-10
2.2 Configuring PPP ..............................................................................................................4-12
2.2.1 Configuring Link Layer Protocol for Interface Encapsulation as PPP...................4-12
2.2.2 Setting Polling Interval ..........................................................................................4-12
2.2.3 Setting PPP Authentication Mode User Name and User Password..................... 4-13
2.2.4 Configuring PPP Authentication Mode of AAA ..................................................... 4-15
2.2.5 Setting PPP Negotiation Parameters....................................................................4-15
2.2.6 Configuring PPP Compression ............................................................................. 4-16
2.2.7 Configuring PPP Link Quality Monitoring..............................................................4-16
2.2.8 Configuring Callback............................................................................................. 4-17
2.2.9 Configuring the Dialing String Needed for Firewall Callback................................4-17
2.2.10 Configuring DNS Address Negotiation................................................................4-18
2.2.11 Configuring VJ TCP Header Compression.........................................................4-18
2.3 Displaying and Debugging PPP.......................................................................................4-19
2.4 Typical Example for Configuring PPP..............................................................................4-19
2.4.1 PAP Authentication Example................................................................................4-19
2.4.2 CHAP Authentication Example ............................................................................. 4-20
2.5 Troubleshooting PPP.......................................................................................................4-20
Chapter 3 PPPoE Configuration ................................................................................................ 4-22
3.1 PPPoE Overview .............................................................................................................4-22
3.1.1 Introduction to the PPPoE Protocol ......................................................................4-22
3.1.2 Introduction to PPPoE Application........................................................................4-22