EasyManua.ls Logo

ZyXEL Communications MGS-3712F - Page 17

ZyXEL Communications MGS-3712F
382 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
MGS-3712/MGS-3712F User’s Guide
17
25.3 Supported RADIUS Attributes ......................................................................................... 231
25.3.1 Attributes Used for Authentication .......................................................................... 232
25.3.2 Attributes Used for Accounting ............................................................................... 233
Chapter 26
IP Source Guard....................................................................................................................235
26.1 IP Source Guard Overview .............................................................................................. 235
26.1.1 DHCP Snooping Overview ..................................................................................... 236
26.1.2 ARP Inspection Overview ...................................................................................... 238
26.2 IP Source Guard .............................................................................................................. 239
26.3 IP Source Guard Static Binding ....................................................................................... 240
26.4 DHCP Snooping .............................................................................................................. 243
26.5 DHCP Snooping Configure .............................................................................................. 246
26.5.1 DHCP Snooping Port Configure ............................................................................. 248
26.5.2 DHCP Snooping VLAN Configure .......................................................................... 249
26.6 ARP Inspection Status .....................................................................................................251
26.6.1 ARP Inspection VLAN Status ................................................................................. 252
26.6.2 ARP Inspection Log Status .................................................................................... 253
26.7 ARP Inspection Configure ............................................................................................... 254
26.7.1 ARP Inspection Port Configure .............................................................................. 256
26.7.2 ARP Inspection VLAN Configure ........................................................................... 258
Chapter 27
Loop Guard............................................................................................................................261
27.1 Loop Guard Overview ..................................................................................................... 261
27.2 Loop Guard Setup ........................................................................................................... 263
Chapter 28
VLAN Mapping ......................................................................................................................265
28.1 VLAN Mapping Overview ............................................................................................... 265
28.1.1 VLAN Mapping Example ........................................................................................ 265
28.2 Enabling VLAN Mapping ................................................................................................. 266
28.3 Configuring VLAN Mapping ............................................................................................. 267
Chapter 29
Layer 2 Protocol Tunneling..................................................................................................269
29.1 Layer 2 Protocol Tunneling Overview ............................................................................. 269
29.1.1 Layer 2 Protocol Tunneling Mode .......................................................................... 270
29.2 Configuring Layer 2 Protocol Tunneling .......................................................................... 271
Part IV: IP Application.......................................................................... 273

Table of Contents

Related product manuals