Table of Contents
ES3500 Series User’s Guide
11
25.2.2 TACACS+ Server Setup
.....................................................................................
206
25.2.3 AAA Setup
..............................................................................................................
208
25.2.4 Vendor Specific Attribute
........................................................................................
210
25.2.5 Tunnel Protocol Attribute
........................................................................................
211
25.3 Supported RADIUS Attributes
..........................................................................................
211
25.3.1 Attributes Used for Authentication
..........................................................................
212
25.3.2 Attributes Used for Accounting
...............................................................................
212
Chapter
26
IP Source Guard
....................................................................................................................
215
26.1 IP Source Guard Overview
..............................................................................................
215
26.1.1 DHCP Snooping Overview
.....................................................................................
215
26.1.2 ARP Inspection Overview
.......................................................................................
217
26.2 IP Source Guard
..............................................................................................................
219
26.3 IP Source Guard Static Binding
........................................................................................
219
26.4 DHCP Snooping
...............................................................................................................
221
26.5 DHCP Snooping Configure
..............................................................................................
223
26.5.1 DHCP Snooping Port Configure
.............................................................................
225
26.5.2 DHCP Snooping VLAN Configure
..........................................................................
226
26.6 ARP Inspection Status
.....................................................................................................
227
26.6.1 ARP Inspection VLAN Status
.................................................................................
228
26.6.2 ARP Inspection Log Status
.....................................................................................
229
26.7 ARP Inspection Configure
................................................................................................
230
26.7.1 ARP Inspection Port Configure
...............................................................................
231
26.7.2 ARP Inspection VLAN Configure
............................................................................
233
Chapter
27
Loop Guard
...........................................................................................................................
234
27.1 Loop Guard Overview
.....................................................................................................
234
27.2 Loop Guard Setup
............................................................................................................
236
Chapter
28
VLAN Mapping
......................................................................................................................
238
28.1 VLAN Mapping Overview
................................................................................................
238
28.1.1 VLAN Mapping Example
........................................................................................
238
28.2 Enabling VLAN Mapping
..................................................................................................
239
28.3 Configuring VLAN Mapping
..............................................................................................
240
Chapter
29
Layer 2 Protocol Tunneling
..................................................................................................
242
29.1 Layer 2 Protocol Tunneling Overview
.............................................................................
242
29.1.1 Layer-2 Protocol Tunneling Mode
...........................................................................
243
29.2 Configuring Layer 2 Protocol Tunneling
...........................................................................
244