Method used to achieve power supply backup

3

Two PIU boards can supply power to the system in hot backup mode. With the power supply backup, when one of the two PIU boards becomes faulty, the subrack can still function properly.

Other related questions:
Method used to back up the power supply for the OSN 6800
Two PIU boards supply power to the system in hot backup mode. When either of the two PIU boards becomes faulty, the subrack can still function properly.

Method used to configure the power supply pool for the OSN 9800
The OSN 9800 uses power supply pools to achieve load-based flexible power distribution. The power load at the initial network construction stage usually differs from that at the network expansion stage. Flexible power distribution allows you to flexibly configure the rated input current based on the power loads, which achieves power supply expansion without service interruption.

Can a backup power module independently supply power for on an S series DC switch
A backup power module can be configured on an S series DC switch to independently supply power.

DHCP snooping configuration on USG firewalls
You can configure the DHCP snooping on USG firewalls as follows: The DHCP snooping is a DHCP security feature. It can protect devices against DHCP DoS attack, DHCP server spoofing, ARP man-in-the-middle attack, and IP/MAC spoofing attack when using the DHCP. The most commonly used function of the DHCP server snooping is to protect devices against the DHCP DoS attack. It can prevent users from obtaining IP addresses from other DHCP servers (such as private routers) except for the firewall. However, the firewall does not restrict private routers. The key configuration is as follows: 1. Enable the global and interface DHCP snooping. [USG] dhcp snooping enable [USG] interface GigabitEthernet 0/0/1 [USG-GigabitEthernet0/0/1] dhcp snooping enable [USG-GigabitEthernet0/0/1] quit [USG] interface GigabitEthernet 0/0/2 [USG-GigabitEthernet0/0/2] dhcp snooping enable [USG-GigabitEthernet0/0/2] quit 2. Configure the Trusted interface to prevent DHCP server spoofing. Set the interface connected to the DHCP server to the Trusted mode and the interface connected to the DHCP client to the Untrusted mode (after the DHCP snooping is enabled for the interfaces, the interfaces are in Untrusted mode by default). [USG] interface GigabitEthernet 0/0/2 [USG-GigabitEthernet0/0/2] dhcp snooping trusted [USG-GigabitEthernet0/0/2] quit Note: The DHCP snooping takes effect only when the firewall serves as the DHCP server or the upper-level device of the firewall is the DHCP server. If the lower-level switch interconnected to the USG firewall serves as the DHCP server, DHCP packets do not pass through the firewall. This configuration is invalid. Therefore, the DHCP snooping must be configured on the switch. For specific configurations, click DHCP Snooping Configuration on USG Firewalls.

Method used to configure extended ECC in a slave subrack and method used to connect network cables to achieve extended ECC communication
The NM_ETH port of a slave subrack is disabled by default and is not used for inter-NE communication. Inter-NE communication is implemented only through the NM_ETH port of a master subrack.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top