Table of Contents

 

24.1.2 What You Need to Know ......................................................................................................

192

24.2

AAA Screens .................................................................................................................................

193

24.3

RADIUS Server Setup ...............................................................................................................

193

24.4

TACACS+ Server Setup ............................................................................................................

195

24.5

AAA Setup ....................................................................................................................................

197

24.6

Technical Reference ......................................................................................................................

200

24.6.1 Vendor Specific Attribute .....................................................................................................

200

24.6.2 Supported RADIUS Attributes .............................................................................................

201

24.6.3 Attributes Used for Authentication .......................................................................................

202

Chapter 25

 

IP Source Guard................................................................................................................................

203

25.1

Overview .......................................................................................................................................

203

25.1.1 What You Can Do ................................................................................................................

203

25.1.2 What You Need to Know ......................................................................................................

204

25.2

IP Source Guard ..........................................................................................................................

204

25.3

IP Source Guard Static Binding ....................................................................................................

205

25.4 DHCP Snooping ...........................................................................................................................

206

25.5

DHCP Snooping Configure ..........................................................................................................

209

25.5.1 DHCP Snooping Port Configure .........................................................................................

211

25.5.2 DHCP Snooping VLAN Configure ......................................................................................

213

25.5.3 DHCP Snooping VLAN Port Configure ................................................................................

213

25.6

ARP Inspection Status .................................................................................................................

215

25.7

ARP Inspection VLAN Status ........................................................................................................

216

25.8

ARP Inspection Log Status ...........................................................................................................

216

25.9

ARP Inspection Configure .............................................................................................................

218

25.9.1 ARP Inspection Port Configure ............................................................................................

219

25.9.2 ARP Inspection VLAN Configure .........................................................................................

221

25.10 Technical Reference ....................................................................................................................

222

25.10.1 DHCP Snooping Overview ................................................................................................

222

25.10.2 ARP Inspection Overview ..................................................................................................

224

Chapter 26

 

Loop Guard .......................................................................................................................................

226

26.1

Loop Guard Overview ..................................................................................................................

226

26.1.1 What You Can Do ................................................................................................................

226

26.1.2 What You Need to Know ......................................................................................................

226

26.2

Loop Guard Setup .........................................................................................................................

228

Chapter 27

 

Layer 2 Protocol Tunneling..............................................................................................................

230

27.1

Layer 2 Protocol Tunneling Overview ..........................................................................................

230

27.1.1 What You Can Do ................................................................................................................

230

 

GS2210 Series User’s Guide

 

11