Table of Contents
MES3500-24/24F User’s Guide
15
25.1.1 Local User Accounts
...............................................................................................
201
25.1.2 RADIUS and TACACS+
.........................................................................................
202
25.2 AAA Screens
....................................................................................................................
202
25.2.1 RADIUS Server Setup
..........................................................................................
202
25.2.2 TACACS+ Server Setup
.....................................................................................
205
25.2.3 AAA Setup
..............................................................................................................
207
25.2.4 Vendor Specific Attribute
........................................................................................
209
25.2.5 Tunnel Protocol Attribute
........................................................................................
210
25.3 Supported RADIUS Attributes
..........................................................................................
210
25.3.1 Attributes Used for Authentication
..........................................................................
211
25.3.2 Attributes Used for Accounting
...............................................................................
211
Chapter
26
IP Source Guard
....................................................................................................................
214
26.1 IP Source Guard Overview
..............................................................................................
214
26.1.1 DHCP Snooping Overview
.....................................................................................
214
26.1.2 ARP Inspection Overview
.......................................................................................
216
26.2 IP Source Guard
..............................................................................................................
218
26.3 IP Source Guard Static Binding
........................................................................................
218
26.4 DHCP Snooping
...............................................................................................................
220
26.5 DHCP Snooping Configure
..............................................................................................
222
26.5.1 DHCP Snooping Port Configure
.............................................................................
224
26.5.2 DHCP Snooping VLAN Configure
..........................................................................
225
26.6 ARP Inspection Status
.....................................................................................................
226
26.6.1 ARP Inspection VLAN Status
.................................................................................
227
26.6.2 ARP Inspection Log Status
.....................................................................................
228
26.7 ARP Inspection Configure
................................................................................................
229
26.7.1 ARP Inspection Port Configure
...............................................................................
230
26.7.2 ARP Inspection VLAN Configure
............................................................................
232
Chapter
27
Loop Guard
...........................................................................................................................
233
27.1 Loop Guard Overview
.....................................................................................................
233
27.2 Loop Guard Setup
............................................................................................................
235
Chapter
28
VLAN Mapping
......................................................................................................................
237
28.1 VLAN Mapping Overview
................................................................................................
237
28.1.1 VLAN Mapping Example
........................................................................................
237
28.2 Enabling VLAN Mapping
..................................................................................................
238
28.3 Configuring VLAN Mapping
..............................................................................................
239
Chapter
29
Layer 2 Protocol Tunneling
..................................................................................................
241