ZyXEL VES1724-56 User Guide - Page 258
ARP Inspection Status
View all ZyXEL VES1724-56 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 258 highlights
Chapter 26 IP Source Guard The following table describes the labels in this screen. Table 110 DHCP Snooping VLAN Configure LABEL Show VLAN Start VID End VID Apply VID Enabled Option82 Information Apply Cancel DESCRIPTION Use this section to specify the VLANs you want to manage in the section below. Enter the lowest VLAN ID you want to manage in the section below. Enter the highest VLAN ID you want to manage in the section below. Click this to display the specified range of VLANs in the section below. This field displays the VLAN ID of each VLAN in the range specified above. If you configure the * VLAN, the settings are applied to all VLANs. Select Yes to enable DHCP snooping on the VLAN. You still have to enable DHCP snooping on the Switch and specify trusted ports. If DHCP is enabled and there are no trusted ports, DHCP requests will not succeed. Select this to have the Switch add the slot number, port number and VLAN ID to DHCP requests that it broadcasts to the DHCP VLAN, if specified, or VLAN. You can specify the DHCP VLAN in the DHCP Snooping Configure screen. See Section 26.5 on page 254. Select this to have the Switch add the system name to DHCP requests that it broadcasts to the DHCP VLAN, if specified, or VLAN. You can configure the system name in the General Setup screen. See Chapter 8 on page 73. You can specify the DHCP VLAN in the DHCP Snooping Configure screen. See Section 26.5 on page 254. Click Apply to save your changes to the Switch's run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring. Click this to reset the values in this screen to their last-saved values. 26.6 ARP Inspection Status Use this screen to look at the current list of MAC address filters that were created because the Switch identified an unauthorized ARP packet. When the Switch identifies an unauthorized ARP packet, it automatically creates a MAC address filter to block traffic from the source MAC address 258 VES1724-56 User's Guide