Table of Contents

25.2.2 TACACS+ Server Setup .....................................................................................

206

25.2.3 AAA Setup ..............................................................................................................

208

25.2.4 Vendor Specific Attribute ........................................................................................

210

25.2.5 Tunnel Protocol Attribute ........................................................................................

211

25.3

Supported RADIUS Attributes ..........................................................................................

211

25.3.1 Attributes Used for Authentication ..........................................................................

212

25.3.2 Attributes Used for Accounting ...............................................................................

212

Chapter 26

 

IP Source Guard....................................................................................................................

215

26.1

IP Source Guard Overview ..............................................................................................

215

26.1.1 DHCP Snooping Overview .....................................................................................

215

26.1.2 ARP Inspection Overview .......................................................................................

217

26.2

IP Source Guard ..............................................................................................................

219

26.3

IP Source Guard Static Binding ........................................................................................

219

26.4 DHCP Snooping ...............................................................................................................

221

26.5

DHCP Snooping Configure ..............................................................................................

223

26.5.1 DHCP Snooping Port Configure .............................................................................

225

26.5.2 DHCP Snooping VLAN Configure ..........................................................................

226

26.6

ARP Inspection Status .....................................................................................................

227

26.6.1 ARP Inspection VLAN Status .................................................................................

228

26.6.2 ARP Inspection Log Status .....................................................................................

229

26.7

ARP Inspection Configure ................................................................................................

230

26.7.1 ARP Inspection Port Configure ...............................................................................

231

26.7.2 ARP Inspection VLAN Configure ............................................................................

233

Chapter 27

 

Loop Guard ...........................................................................................................................

234

27.1

Loop Guard Overview .....................................................................................................

234

27.2

Loop Guard Setup ............................................................................................................

236

Chapter 28

 

VLAN Mapping ......................................................................................................................

238

28.1

VLAN Mapping Overview ................................................................................................

238

28.1.1 VLAN Mapping Example ........................................................................................

238

28.2

Enabling VLAN Mapping ..................................................................................................

239

28.3

Configuring VLAN Mapping ..............................................................................................

240

Chapter 29

 

Layer 2 Protocol Tunneling..................................................................................................

242

29.1

Layer 2 Protocol Tunneling Overview .............................................................................

242

29.1.1 Layer-2 Protocol Tunneling Mode ...........................................................................

243

29.2

Configuring Layer 2 Protocol Tunneling ...........................................................................

244

 

11

ES3500 Series User’s Guide