Table of Contents
MGS3520 Series User’s Guide
11
25.1.4 IGMP Snooping and VLANs ................................................................................................201
25.1.5 MLD Snooping-proxy ...........................................................................................................201
25.1.6 MLD Messages ....................................................................................................................202
25.2 Multicast Setup ..............................................................................................................................202
25.3 IPv4 Multicast Status ....................................................................................................................202
25.3.1 IGMP Snooping ..................................................................................................................203
25.3.2 IGMP Snooping VLAN ........................................................................................................206
25.3.3 IGMP Filtering Profile .........................................................................................................207
25.4 IPv6 Multicast Status ....................................................................................................................208
25.4.1 MLD Snooping-proxy ...........................................................................................................209
25.4.2 MLD Snooping-proxy VLAN ................................................................................................209
25.4.3 MLD Snooping-proxy VLAN Port Role Setting .................................................................... 211
25.4.4 MLD Snooping-proxy Filtering .............................................................................................213
25.4.5 MLD Snooping-proxy Filtering Profile ..................................................................................215
25.5 MVR Overview .............................................................................................................................216
25.5.1 Types of MVR Ports .............................................................................................................216
25.5.2 MVR Modes .........................................................................................................................216
25.5.3 How MVR Works .................................................................................................................216
25.6 General MVR Configuration ..........................................................................................................217
25.6.1 MVR Group Configuration ..................................................................................................219
25.6.2 MVR Configuration Example ...............................................................................................221
Chapter 26
AAA....................................................................................................................................................223
26.1 Authentication, Authorization and Accounting (AAA) ....................................................................223
26.1.1 Local User Accounts ............................................................................................................223
26.1.2 RADIUS and TACACS+ ......................................................................................................224
26.2 AAA Screens .................................................................................................................................224
26.2.1 RADIUS Server Setup .......................................................................................................224
26.2.2 TACACS+ Server Setup ..................................................................................................226
26.2.3 AAA Setup ...........................................................................................................................228
26.2.4 Vendor Specific Attribute .....................................................................................................231
26.2.5 Tunnel Protocol Attribute .....................................................................................................232
26.3 Supported RADIUS Attributes .......................................................................................................232
26.3.1 Attributes Used for Authentication .......................................................................................233
26.3.2 Attributes Used for Accounting ............................................................................................233
Chapter 27
IP Source Guard................................................................................................................................236
27.1 IP Source Guard Overview ...........................................................................................................236
27.1.1 DHCP Snooping Overview ..................................................................................................236
27.1.2 ARP Inspection Overview ....................................................................................................238
27.2 IP Source Guard ...........................................................................................................................240