10
12.1 INTRODUCTION TO SNTP.................................................................................. 360
12.2 COMMAND FOR SNTP...................................................................................... 361
12.2.1 clock timezone............................................................................................ 361
12.2.2 sntp server.................................................................................................. 361
12.2.3 sntp poll ...................................................................................................... 362
12.2.4 debug sntp.................................................................................................. 362
12.2.5 show sntp ................................................................................................... 362
12.3 TYPICAL SNTP CONFIGURATION EXAMPLES ...................................................... 363
12.4 WEB MANAGEMENT.......................................................................................... 363
12.4.1 SNMP/NTP server configuration................................................................. 363
12.4.2 Request interval configuration .................................................................... 364
12.4.3 Time difference ........................................................................................... 364
12.4.4 Show SNTP................................................................................................ 364
CHAPTER 13 PREVENT ARP, ND SPOOFING CONFIGURATION............................ 365
13.1 OVERVIEW ....................................................................................................... 365
13.1.1 ARP ( Address Resolution Protocol) ........................................................... 365
13.1.2 ARP Spoofing ............................................................................................. 365
13.1.3 How to prevent void ARP/ND Spoofing for our Layer 3 Switch................... 366
13.2 PREVENT ARP, ND SPOOFING CONFIGURATION ................................................. 366
13.2.1 Prevent ARP, ND Spoofing Configuration Task List .................................... 366
13.3 COMMANDS FOR PREVENTING ARP, ND SPOOFING ........................................... 367
13.3.1 ip arp-security updateprotect ...................................................................... 367
13.3.2 ipv6 nd-security updateprotect.................................................................... 368
13.3.3 ip arp-security learnprotect ......................................................................... 368
13.3.4 ipv6 nd learnprotect .................................................................................... 368
13.3.5 ip arp-security convert ................................................................................ 369
13.3.6 ipv6 nd-security convert.............................................................................. 369
13.3.7 clear ip arp dynamic ................................................................................... 369
13.3.8 clear ipv6 nd dynamic................................................................................. 369
13.4 PREVENT ARP, ND SPOOFING EXAMPLE ........................................................... 370
CHAPTER 14 ROUTING PROTOCOL.........................................................................372
14.1 ROUTING PROTOCOL OVERVIEW ....................................................................... 372
14.1.1 Routing Table.............................................................................................. 373
14.2 IP ROUTING POLICY ......................................................................................... 374
14.2.1 Introduction To Routing Policy .................................................................... 374
14.2.2 IP Routing Policy Configuration Task List ................................................... 376
14.2.3 Command For Routing Policy..................................................................... 380
14.2.4 Configuration Examples ............................................................................. 392