Table of Contents
MES-3728 User’s Guide
17
25.2.4 Vendor Specific Attribute
........................................................................................
230
25.3 Supported RADIUS Attributes
.........................................................................................
231
25.3.1 Attributes Used for Authentication
..........................................................................
232
25.3.2 Attributes Used for Accounting
...............................................................................
233
Chapter
26
IP Source Guard
....................................................................................................................
235
26.1 IP Source Guard Overview
..............................................................................................
235
26.1.1 DHCP Snooping Overview
.....................................................................................
236
26.1.2 ARP Inspection Overview
......................................................................................
238
26.2 IP Source Guard
..............................................................................................................
239
26.3 IP Source Guard Static Binding
.......................................................................................
240
26.4 DHCP Snooping
..............................................................................................................
243
26.5 DHCP Snooping Configure
..............................................................................................
247
26.5.1 DHCP Snooping Port Configure
.............................................................................
249
26.5.2 DHCP Snooping VLAN Configure
..........................................................................
250
26.6 ARP Inspection Status
.....................................................................................................
252
26.6.1 ARP Inspection VLAN Status
.................................................................................
253
26.6.2 ARP Inspection Log Status
....................................................................................
254
26.7 ARP Inspection Configure
...............................................................................................
255
26.7.1 ARP Inspection Port Configure
..............................................................................
257
26.7.2 ARP Inspection VLAN Configure
...........................................................................
259
Chapter
27
Loop Guard
............................................................................................................................
261
27.1 Loop Guard Overview
.....................................................................................................
261
27.2 Loop Guard Setup
...........................................................................................................
263
Chapter
28
VLAN Mapping
......................................................................................................................
265
28.1 VLAN Mapping Overview
...............................................................................................
265
28.1.1 VLAN Mapping Example
........................................................................................
265
28.2 Enabling VLAN Mapping
.................................................................................................
266
28.3 Configuring VLAN Mapping
.............................................................................................
267
Chapter
29
Layer 2 Protocol Tunneling
..................................................................................................
269
29.1 Layer 2 Protocol Tunneling Overview
.............................................................................
269
29.1.1 Layer 2 Protocol Tunneling Mode
..........................................................................
270
29.2 Configuring Layer 2 Protocol Tunneling
..........................................................................
271
Part IV: IP Application
..........................................................................
273