Zyxel MGS3520-28F [11/338] Chapter 26 ip source guard 02

Zyxel MGS3520-28 [11/338] Chapter 26 ip source guard 02
Table of Contents
MES3500/MGS3520 Series User’s Guide
11
25.2.4 Vendor Specific Attribute .....................................................................................................197
25.2.5 Tunnel Protocol Attribute .....................................................................................................198
25.3 Supported RADIUS Attributes .......................................................................................................198
25.3.1 Attributes Used for Authentication .......................................................................................199
25.3.2 Attributes Used for Accounting ............................................................................................199
Chapter 26
IP Source Guard................................................................................................................................202
26.1 IP Source Guard Overview ...........................................................................................................202
26.1.1 DHCP Snooping Overview ..................................................................................................202
26.1.2 ARP Inspection Overview ....................................................................................................204
26.2 IP Source Guard ...........................................................................................................................206
26.3 IP Source Guard Static Binding .....................................................................................................206
26.4 DHCP Snooping ............................................................................................................................207
26.5 DHCP Snooping Configure ...........................................................................................................210
26.5.1 DHCP Snooping Port Configure ..........................................................................................212
26.5.2 DHCP Snooping VLAN Configure .......................................................................................213
26.6 ARP Inspection Status ..................................................................................................................214
26.6.1 ARP Inspection VLAN Status ..............................................................................................215
26.6.2 ARP Inspection Log Status ..................................................................................................216
26.7 ARP Inspection Configure .............................................................................................................217
26.7.1 ARP Inspection Port Configure ............................................................................................218
26.7.2 ARP Inspection VLAN Configure .........................................................................................219
Chapter 27
Loop Guard .......................................................................................................................................221
27.1 Loop Guard Overview ..................................................................................................................221
27.2 Loop Guard Setup .........................................................................................................................223
Chapter 28
VLAN Mapping ..................................................................................................................................224
28.1 VLAN Mapping Overview .............................................................................................................224
28.1.1 VLAN Mapping Example .....................................................................................................224
28.2 Enabling VLAN Mapping ...............................................................................................................224
28.3 Configuring VLAN Mapping ...........................................................................................................225
Chapter 29
Layer 2 Protocol Tunneling..............................................................................................................227
29.1 Layer 2 Protocol Tunneling Overview ..........................................................................................227
29.1.1 Layer-2 Protocol Tunneling Mode ........................................................................................228
29.2 Configuring Layer 2 Protocol Tunneling ........................................................................................228
Chapter 30
sFlow..................................................................................................................................................231

Содержание

Похожие устройства

Скачать