EasyManua.ls Logo

ZyXEL Communications XGS3700 Series - Page 11

ZyXEL Communications XGS3700 Series
416 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
GS3700/XGS3700 Series User’s Guide
11
23.2.2 TACACS+ Server Setup ..................................................................................................213
23.2.3 AAA Setup ...........................................................................................................................215
23.2.4 Vendor Specific Attribute .....................................................................................................217
23.2.5 Tunnel Protocol Attribute .....................................................................................................218
23.3 Supported RADIUS Attributes .......................................................................................................218
23.3.1 Attributes Used for Authentication .......................................................................................219
23.3.2 Attributes Used for Accounting ............................................................................................219
Chapter 24
IP Source Guard................................................................................................................................222
24.1 IP Source Guard Overview ...........................................................................................................222
24.1.1 DHCP Snooping Overview ..................................................................................................222
24.1.2 ARP Inspection Overview ....................................................................................................224
24.2 IP Source Guard ...........................................................................................................................226
24.3 IP Source Guard Static Binding .....................................................................................................226
24.4 DHCP Snooping ............................................................................................................................229
24.5 DHCP Snooping Configure ...........................................................................................................231
24.5.1 DHCP Snooping Port Configure ..........................................................................................233
24.5.2 DHCP Snooping VLAN Configure .......................................................................................234
24.5.3 DHCP Snooping VLAN Port Configure ................................................................................235
24.6 ARP Inspection Status ..................................................................................................................236
24.6.1 ARP Inspection VLAN Status ..............................................................................................238
24.6.2 ARP Inspection Log Status ..................................................................................................239
24.7 ARP Inspection Configure .............................................................................................................240
24.7.1 ARP Inspection Port Configure ............................................................................................241
24.7.2 ARP Inspection VLAN Configure .........................................................................................242
Chapter 25
Loop Guard .......................................................................................................................................244
25.1 Loop Guard Overview ..................................................................................................................244
25.2 Loop Guard Setup .........................................................................................................................246
Chapter 26
VLAN Mapping ..................................................................................................................................248
26.1 VLAN Mapping Overview .............................................................................................................248
26.1.1 VLAN Mapping Example .....................................................................................................248
26.2 Enabling VLAN Mapping ...............................................................................................................249
26.3 Configuring VLAN Mapping ...........................................................................................................250
Chapter 27
Layer 2 Protocol Tunneling..............................................................................................................252
27.1 Layer 2 Protocol Tunneling Overview ..........................................................................................252
27.1.1 Layer-2 Protocol Tunneling Mode ........................................................................................253

Table of Contents

Related product manuals