Zyxel XGS3700-24 [11/431] Chapter 24 ip source guard 13

Zyxel XGS3700-24 [11/431] Chapter 24 ip source guard 13
Table of Contents
GS3700/XGS3700 Series User’s Guide
11
23.2.1 RADIUS Server Setup .......................................................................................................201
23.2.2 TACACS+ Server Setup ..................................................................................................203
23.2.3 AAA Setup ...........................................................................................................................205
23.2.4 Vendor Specific Attribute .....................................................................................................208
23.2.5 Tunnel Protocol Attribute .....................................................................................................209
23.3 Supported RADIUS Attributes .......................................................................................................209
23.3.1 Attributes Used for Authentication .......................................................................................210
23.3.2 Attributes Used for Accounting ............................................................................................210
Chapter 24
IP Source Guard................................................................................................................................213
24.1 IP Source Guard Overview ...........................................................................................................213
24.1.1 DHCP Snooping Overview ..................................................................................................213
24.1.2 ARP Inspection Overview ....................................................................................................215
24.2 IP Source Guard ...........................................................................................................................217
24.3 IP Source Guard Static Binding .....................................................................................................217
24.4 DHCP Snooping ............................................................................................................................219
24.5 DHCP Snooping Configure ...........................................................................................................222
24.5.1 DHCP Snooping Port Configure ..........................................................................................224
24.5.2 DHCP Snooping VLAN Configure .......................................................................................225
24.5.3 DHCP Snooping VLAN Port Configure ................................................................................226
24.6 ARP Inspection Status ..................................................................................................................227
24.6.1 ARP Inspection VLAN Status ..............................................................................................228
24.6.2 ARP Inspection Log Status ..................................................................................................229
24.7 ARP Inspection Configure .............................................................................................................231
24.7.1 ARP Inspection Port Configure ............................................................................................232
24.7.2 ARP Inspection VLAN Configure .........................................................................................233
Chapter 25
Loop Guard .......................................................................................................................................235
25.1 Loop Guard Overview ..................................................................................................................235
25.2 Loop Guard Setup .........................................................................................................................237
Chapter 26
VLAN Mapping ..................................................................................................................................238
26.1 VLAN Mapping Overview .............................................................................................................238
26.1.1 VLAN Mapping Example .....................................................................................................238
26.2 Enabling VLAN Mapping ...............................................................................................................238
26.3 Configuring VLAN Mapping ...........................................................................................................239
Chapter 27
Layer 2 Protocol Tunneling..............................................................................................................241
27.1 Layer 2 Protocol Tunneling Overview ..........................................................................................241

Содержание

Похожие устройства

Скачать