Table of Contents

25.2.4 Vendor Specific Attribute ........................................................................................

224

25.2.5 Tunnel Protocol Attribute ........................................................................................

225

25.3

Supported RADIUS Attributes .........................................................................................

226

25.3.1 Attributes Used for Authentication ..........................................................................

226

25.3.2 Attributes Used for Accounting ...............................................................................

227

Chapter 26

 

IP Source Guard....................................................................................................................

231

26.1

IP Source Guard Overview ..............................................................................................

231

26.1.1 DHCP Snooping Overview .....................................................................................

232

26.1.2 ARP Inspection Overview ......................................................................................

234

26.2

IP Source Guard ..............................................................................................................

235

26.3

IP Source Guard Static Binding .......................................................................................

236

26.4 DHCP Snooping ..............................................................................................................

238

26.5

DHCP Snooping Configure ..............................................................................................

241

26.5.1 DHCP Snooping Port Configure .............................................................................

243

26.5.2 DHCP Snooping VLAN Configure ..........................................................................

244

26.6

ARP Inspection Status .....................................................................................................

246

26.6.1 ARP Inspection VLAN Status .................................................................................

247

26.6.2 ARP Inspection Log Status ....................................................................................

248

26.7

ARP Inspection Configure ...............................................................................................

249

26.7.1 ARP Inspection Port Configure ..............................................................................

251

26.7.2 ARP Inspection VLAN Configure ...........................................................................

253

Chapter 27

 

Loop Guard............................................................................................................................

255

27.1

Loop Guard Overview .....................................................................................................

255

27.2

Loop Guard Setup ...........................................................................................................

257

Chapter 28

 

VLAN Mapping ......................................................................................................................

259

28.1

VLAN Mapping Overview ...............................................................................................

259

28.1.1 VLAN Mapping Example ........................................................................................

259

28.2

Enabling VLAN Mapping .................................................................................................

260

28.3

Configuring VLAN Mapping .............................................................................................

261

Chapter 29

 

Layer 2 Protocol Tunneling..................................................................................................

263

29.1

Layer 2 Protocol Tunneling Overview .............................................................................

263

29.1.1 Layer 2 Protocol Tunneling Mode ..........................................................................

264

29.2

Configuring Layer 2 Protocol Tunneling ..........................................................................

265

Chapter 30

 

Private VLAN .........................................................................................................................

267

 

17

XGS-4728F User’s Guide