Table of Contents

25.1.1 Local User Accounts ...............................................................................................

201

25.1.2 RADIUS and TACACS+ .........................................................................................

202

25.2

AAA Screens ....................................................................................................................

202

25.2.1 RADIUS Server Setup ..........................................................................................

202

25.2.2 TACACS+ Server Setup .....................................................................................

205

25.2.3 AAA Setup ..............................................................................................................

207

25.2.4 Vendor Specific Attribute ........................................................................................

209

25.2.5 Tunnel Protocol Attribute ........................................................................................

210

25.3

Supported RADIUS Attributes ..........................................................................................

210

25.3.1 Attributes Used for Authentication ..........................................................................

211

25.3.2 Attributes Used for Accounting ...............................................................................

211

Chapter 26

 

IP Source Guard....................................................................................................................

214

26.1

IP Source Guard Overview ..............................................................................................

214

26.1.1 DHCP Snooping Overview .....................................................................................

214

26.1.2 ARP Inspection Overview .......................................................................................

216

26.2

IP Source Guard ..............................................................................................................

218

26.3

IP Source Guard Static Binding ........................................................................................

218

26.4 DHCP Snooping ...............................................................................................................

220

26.5

DHCP Snooping Configure ..............................................................................................

222

26.5.1 DHCP Snooping Port Configure .............................................................................

224

26.5.2 DHCP Snooping VLAN Configure ..........................................................................

225

26.6

ARP Inspection Status .....................................................................................................

226

26.6.1 ARP Inspection VLAN Status .................................................................................

227

26.6.2 ARP Inspection Log Status .....................................................................................

228

26.7

ARP Inspection Configure ................................................................................................

229

26.7.1 ARP Inspection Port Configure ...............................................................................

230

26.7.2 ARP Inspection VLAN Configure ............................................................................

232

Chapter 27

 

Loop Guard ...........................................................................................................................

233

27.1

Loop Guard Overview .....................................................................................................

233

27.2

Loop Guard Setup ............................................................................................................

235

Chapter 28

 

VLAN Mapping ......................................................................................................................

237

28.1

VLAN Mapping Overview ................................................................................................

237

28.1.1 VLAN Mapping Example ........................................................................................

237

28.2

Enabling VLAN Mapping ..................................................................................................

238

28.3

Configuring VLAN Mapping ..............................................................................................

239

Chapter 29

 

Layer 2 Protocol Tunneling..................................................................................................

241

 

15

MES3500-24/24F User’s Guide