Table of Contents
VES1724-56 User’s Guide
11
24.1.1 IP Multicast Addresses
...........................................................................................
217
24.1.2 IGMP Filtering
.........................................................................................................
217
24.1.3 IGMP Snooping
.....................................................................................................
217
24.1.4 IGMP Snooping and VLANs
...................................................................................
218
24.1.5 IGMP Proxy
............................................................................................................
218
24.1.6 Multicast Listener Discovery
...................................................................................
218
24.1.7 MLD Messages
.......................................................................................................
218
24.2 Multicast Status
...............................................................................................................
219
24.3 Multicast Setting
..............................................................................................................
221
24.4 IGMP Snooping VLAN
....................................................................................................
223
24.5 IGMP Filtering Profile
......................................................................................................
224
24.6 MVR Overview
................................................................................................................
225
24.6.1 Types of MVR Ports
................................................................................................
226
24.6.2 MVR Modes
............................................................................................................
226
24.6.3 How MVR Works
....................................................................................................
226
24.7 General MVR Configuration
.............................................................................................
227
24.8 MVR Group Configuration
...............................................................................................
229
24.8.1 MVR Configuration Example
..................................................................................
230
Chapter
25
Authentication and Accounting
..........................................................................................
233
25.1 Authentication, Authorization and Accounting
.................................................................
233
25.1.1 Local User Accounts
...............................................................................................
233
25.1.2 RADIUS and TACACS+
.........................................................................................
234
25.2 Authentication and Accounting Screens
..........................................................................
234
25.2.1 RADIUS Server Setup
........................................................................................
234
25.2.2 TACACS+ Server Setup
.....................................................................................
237
25.2.3 Authentication and Accounting Setup
.................................................................
239
25.2.4 Vendor Specific Attribute
........................................................................................
241
25.3 Supported RADIUS Attributes
..........................................................................................
242
25.3.1 Attributes Used for Authentication
..........................................................................
242
25.3.2 Attributes Used for Accounting
...............................................................................
243
Chapter
26
IP Source Guard
....................................................................................................................
246
26.1 IP Source Guard Overview
..............................................................................................
246
26.1.1 DHCP Snooping Overview
.....................................................................................
246
26.1.2 ARP Inspection Overview
.......................................................................................
248
26.2 IP Source Guard
..............................................................................................................
250
26.3 IP Source Guard Static Binding
........................................................................................
250
26.4 DHCP Snooping
...............................................................................................................
252
26.5 DHCP Snooping Configure
..............................................................................................
254
26.5.1 DHCP Snooping Port Configure
.............................................................................
256