Table of Contents
VES1724-56 User’s Guide
12
26.1.2 ARP Inspection Overview
.......................................................................................
251
26.2 IP Source Guard
..............................................................................................................
253
26.3 IP Source Guard Static Binding
........................................................................................
253
26.4 DHCP Snooping
...............................................................................................................
255
26.5 DHCP Snooping Configure
..............................................................................................
257
26.5.1 DHCP Snooping Port Configure
.............................................................................
259
26.5.2 DHCP Snooping VLAN Configure
..........................................................................
260
26.6 ARP Inspection Status
.....................................................................................................
261
26.6.1 ARP Inspection VLAN Status
.................................................................................
263
26.6.2 ARP Inspection Log Status
.....................................................................................
264
26.7 ARP Inspection Configure
................................................................................................
265
26.7.1 ARP Inspection Port Configure
...............................................................................
266
26.7.2 ARP Inspection VLAN Configure
............................................................................
268
Chapter
27
Loop Guard
...........................................................................................................................
270
27.1 Loop Guard Overview
.....................................................................................................
270
27.2 Loop Guard Setup
............................................................................................................
272
Chapter
28
CFM
........................................................................................................................................
274
28.1 CFM Overview
................................................................................................................
274
28.1.1 How CFM Works
.....................................................................................................
274
28.2 CFM MA
...........................................................................................................................
275
28.3 CFM MD
...........................................................................................................................
277
Chapter
29
VLAN Mapping
......................................................................................................................
278
29.1 VLAN Mapping Overview
................................................................................................
278
29.1.1 VLAN Mapping Example
........................................................................................
278
29.2 Enabling VLAN Mapping
..................................................................................................
279
29.3 Configuring VLAN Mapping
..............................................................................................
280
Chapter
30
Layer 2 Protocol Tunneling
..................................................................................................
282
30.1 Layer 2 Protocol Tunneling Overview
.............................................................................
282
30.1.1 Layer 2 Protocol Tunneling Mode
...........................................................................
283
30.2 Configuring Layer 2 Protocol Tunneling
...........................................................................
284
Chapter
31
DoS Prevention
.....................................................................................................................
286
31.1 DoS Prevention Overview
...............................................................................................
286
31.2 Configuring DoS Prevention
.............................................................................................
286