Table of Contents
25.2.4 Vendor Specific Attribute ........................................................................................
224
25.2.5 Tunnel Protocol Attribute ........................................................................................
225
25.3
Supported RADIUS Attributes .........................................................................................
226
25.3.1 Attributes Used for Authentication ..........................................................................
25.3.2 Attributes Used for Accounting ...............................................................................
227
Chapter 26
IP Source Guard....................................................................................................................
231
26.1
IP Source Guard Overview ..............................................................................................
26.1.1 DHCP Snooping Overview .....................................................................................
232
26.1.2 ARP Inspection Overview ......................................................................................
234
26.2
IP Source Guard ..............................................................................................................
235
26.3
IP Source Guard Static Binding .......................................................................................
236
26.4 DHCP Snooping ..............................................................................................................
238
26.5
DHCP Snooping Configure ..............................................................................................
241
26.5.1 DHCP Snooping Port Configure .............................................................................
243
26.5.2 DHCP Snooping VLAN Configure ..........................................................................
244
26.6
ARP Inspection Status .....................................................................................................
246
26.6.1 ARP Inspection VLAN Status .................................................................................
247
26.6.2 ARP Inspection Log Status ....................................................................................
248
26.7
ARP Inspection Configure ...............................................................................................
249
26.7.1 ARP Inspection Port Configure ..............................................................................
251
26.7.2 ARP Inspection VLAN Configure ...........................................................................
253
Chapter 27
Loop Guard............................................................................................................................
255
27.1
Loop Guard Overview .....................................................................................................
27.2
Loop Guard Setup ...........................................................................................................
257
Chapter 28
VLAN Mapping ......................................................................................................................
259
28.1
VLAN Mapping Overview ...............................................................................................
28.1.1 VLAN Mapping Example ........................................................................................
28.2
Enabling VLAN Mapping .................................................................................................
260
28.3
Configuring VLAN Mapping .............................................................................................
261
Chapter 29
Layer 2 Protocol Tunneling..................................................................................................
263
29.1
Layer 2 Protocol Tunneling Overview .............................................................................
29.1.1 Layer 2 Protocol Tunneling Mode ..........................................................................
264
29.2
Configuring Layer 2 Protocol Tunneling ..........................................................................
265
Chapter 30
Private VLAN .........................................................................................................................
267
17
XGS-4728F User’s Guide