
Table of Contents
GS3700/XGS3700 Series User’s Guide
11
23.2.2 TACACS+ Server Setup ..................................................................................................213
23.2.3 AAA Setup ...........................................................................................................................215
23.2.4 Vendor Specific Attribute .....................................................................................................217
23.2.5 Tunnel Protocol Attribute .....................................................................................................218
23.3 Supported RADIUS Attributes .......................................................................................................218
23.3.1 Attributes Used for Authentication .......................................................................................219
23.3.2 Attributes Used for Accounting ............................................................................................219
Chapter 24
IP Source Guard................................................................................................................................222
24.1 IP Source Guard Overview ...........................................................................................................222
24.1.1 DHCP Snooping Overview ..................................................................................................222
24.1.2 ARP Inspection Overview ....................................................................................................224
24.2 IP Source Guard ...........................................................................................................................226
24.3 IP Source Guard Static Binding .....................................................................................................226
24.4 DHCP Snooping ............................................................................................................................229
24.5 DHCP Snooping Configure ...........................................................................................................231
24.5.1 DHCP Snooping Port Configure ..........................................................................................233
24.5.2 DHCP Snooping VLAN Configure .......................................................................................234
24.5.3 DHCP Snooping VLAN Port Configure ................................................................................235
24.6 ARP Inspection Status ..................................................................................................................236
24.6.1 ARP Inspection VLAN Status ..............................................................................................238
24.6.2 ARP Inspection Log Status ..................................................................................................239
24.7 ARP Inspection Configure .............................................................................................................240
24.7.1 ARP Inspection Port Configure ............................................................................................241
24.7.2 ARP Inspection VLAN Configure .........................................................................................242
Chapter 25
Loop Guard .......................................................................................................................................244
25.1 Loop Guard Overview ..................................................................................................................244
25.2 Loop Guard Setup .........................................................................................................................246
Chapter 26
VLAN Mapping ..................................................................................................................................248
26.1 VLAN Mapping Overview .............................................................................................................248
26.1.1 VLAN Mapping Example .....................................................................................................248
26.2 Enabling VLAN Mapping ...............................................................................................................249
26.3 Configuring VLAN Mapping ...........................................................................................................250
Chapter 27
Layer 2 Protocol Tunneling..............................................................................................................252
27.1 Layer 2 Protocol Tunneling Overview ..........................................................................................252
27.1.1 Layer-2 Protocol Tunneling Mode ........................................................................................253
Komentáře k této Příručce