Table of Contents
VES1724-56 User’s Guide
11
23.4.2 Selective Q-in-Q
....................................................................................................
214
23.4.3 Port-based InnerQ
..................................................................................................
215
Chapter
24
Multicast
................................................................................................................................
217
24.1 Multicast Overview
..........................................................................................................
217
24.1.1 IP Multicast Addresses
...........................................................................................
217
24.1.2 IGMP Filtering
.........................................................................................................
217
24.1.3 IGMP Snooping
.....................................................................................................
217
24.1.4 IGMP Snooping and VLANs
...................................................................................
218
24.1.5 IGMP Proxy
............................................................................................................
218
24.1.6 Multicast Listener Discovery
...................................................................................
218
24.1.7 MLD Messages
.......................................................................................................
218
24.2 Multicast Status
...............................................................................................................
219
24.3 Multicast Setting
..............................................................................................................
224
24.4 IGMP Snooping VLAN
....................................................................................................
226
24.5 IGMP Filtering Profile
......................................................................................................
227
24.6 MVR Overview
................................................................................................................
229
24.6.1 Types of MVR Ports
................................................................................................
229
24.6.2 MVR Modes
............................................................................................................
229
24.6.3 How MVR Works
....................................................................................................
229
24.7 General MVR Configuration
.............................................................................................
230
24.8 MVR Group Configuration
...............................................................................................
232
24.8.1 MVR Configuration Example
..................................................................................
234
Chapter
25
Authentication and Accounting
..........................................................................................
236
25.1 Authentication, Authorization and Accounting
.................................................................
236
25.1.1 Local User Accounts
...............................................................................................
236
25.1.2 RADIUS and TACACS+
.........................................................................................
237
25.2 Authentication and Accounting Screens
..........................................................................
237
25.2.1 RADIUS Server Setup
........................................................................................
237
25.2.2 TACACS+ Server Setup
.....................................................................................
240
25.2.3 Authentication and Accounting Setup
.................................................................
242
25.2.4 Vendor Specific Attribute
........................................................................................
244
25.3 Supported RADIUS Attributes
..........................................................................................
245
25.3.1 Attributes Used for Authentication
..........................................................................
245
25.3.2 Attributes Used for Accounting
...............................................................................
246
Chapter
26
IP Source Guard
....................................................................................................................
249
26.1 IP Source Guard Overview
..............................................................................................
249
26.1.1 DHCP Snooping Overview
.....................................................................................
249