Table of Contents
XMG1930 Series User’s Guide
23
74.7.1 DHCP Snooping Overview ............................................................................................... 519
Chapter 75
ARP Inspection .................................................................................................................................522
75.1 ARP Inspection Status ................................................................................................................. 522
75.2 ARP Inspection VLAN Status ...................................................................................................... 523
75.3 ARP Inspection Log Status ......................................................................................................... 523
75.4 ARP Inspection Setup ................................................................................................................. 524
75.5 ARP Inspection Port Setup ......................................................................................................... 526
75.6 ARP Inspection VLAN Setup ...................................................................................................... 527
75.7 IPv6 Source Guard ...................................................................................................................... 528
75.8 IPv6 Source Binding Status ......................................................................................................... 529
75.9 IPv6 Static Binding ...................................................................................................................... 530
75.9.1 Add/Edit IPv6 Static Binding ............................................................................................530
75.10 IPv6 Source Guard Policy ........................................................................................................ 531
75.10.1 Add/Edit an IPv6 Source Guard Policy ......................................................................... 532
75.11 IPv6 Source Guard Port Setup ................................................................................................. 533
75.12 IPv6 Snooping Policy Setup ..................................................................................................... 534
75.12.1 Add/Edit a IPv6 Snooping Policy ................................................................................... 534
75.13 IPv6 Snooping VLAN Setup ...................................................................................................... 535
75.13.1 Add/Edit an IPv6 Snooping VLAN ................................................................................. 536
75.14 IPv6 DHCP Trust Setup .............................................................................................................. 536
75.15 Technical Reference ................................................................................................................ 538
75.15.1 ARP Inspection Overview ............................................................................................... 538
Chapter 76
Port Authentication..........................................................................................................................540
76.1 Port Authentication Overview .................................................................................................. 540
76.1.1 What You Can Do ............................................................................................................. 540
76.1.2 What You Need to Know ................................................................................................. 541
76.1.3 MAC Authentication ........................................................................................................ 541
76.2 Activate IEEE 802.1x Security ..................................................................................................... 542
76.3 Activate MAC Authentication .................................................................................................. 543
76.4 Guest VLAN ................................................................................................................................. 546
76.5 Compound Authentication ....................................................................................................... 548
76.6 Technical Reference .................................................................................................................. 549
76.6.1 IEEE 802.1x .......................................................................................................................... 549
76.6.2 RADIUS ................................................................................................................................ 550
76.6.3 EAP (Extensible Authentication Protocol) Authentication ........................................... 551
76.6.4 EAPOL (EAP over LAN) ...................................................................................................... 552
Chapter 77
Port Security......................................................................................................................................553