Table of Contents
VES1724-56 User’s Guide
12
26.1.2 ARP Inspection Overview .......................................................................................251
26.2 IP Source Guard ..............................................................................................................253
26.3 IP Source Guard Static Binding ........................................................................................253
26.4 DHCP Snooping ...............................................................................................................255
26.5 DHCP Snooping Configure ..............................................................................................257
26.5.1 DHCP Snooping Port Configure .............................................................................259
26.5.2 DHCP Snooping VLAN Configure ..........................................................................260
26.6 ARP Inspection Status .....................................................................................................261
26.6.1 ARP Inspection VLAN Status .................................................................................263
26.6.2 ARP Inspection Log Status .....................................................................................264
26.7 ARP Inspection Configure ................................................................................................265
26.7.1 ARP Inspection Port Configure ...............................................................................266
26.7.2 ARP Inspection VLAN Configure ............................................................................268
Chapter 27
Loop Guard ...........................................................................................................................270
27.1 Loop Guard Overview .....................................................................................................270
27.2 Loop Guard Setup ............................................................................................................272
Chapter 28
CFM........................................................................................................................................274
28.1 CFM Overview ................................................................................................................274
28.1.1 How CFM Works .....................................................................................................274
28.2 CFM MA ...........................................................................................................................275
28.3 CFM MD ...........................................................................................................................277
Chapter 29
VLAN Mapping ......................................................................................................................278
29.1 VLAN Mapping Overview ................................................................................................278
29.1.1 VLAN Mapping Example ........................................................................................278
29.2 Enabling VLAN Mapping ..................................................................................................279
29.3 Configuring VLAN Mapping ..............................................................................................280
Chapter 30
Layer 2 Protocol Tunneling..................................................................................................282
30.1 Layer 2 Protocol Tunneling Overview .............................................................................282
30.1.1 Layer 2 Protocol Tunneling Mode ...........................................................................283
30.2 Configuring Layer 2 Protocol Tunneling ...........................................................................284
Chapter 31
DoS Prevention.....................................................................................................................286
31.1 DoS Prevention Overview ...............................................................................................286
31.2 Configuring DoS Prevention .............................................................................................286