Part iv: ip application – ZyXEL Communications XGS-4526 User Manual

Page 17

Advertising
background image

Table of Contents

XGS-4526 User’s Guide

17

25.2.5 Tunnel Protocol Attribute ........................................................................................ 233

25.3 Supported RADIUS Attributes ......................................................................................... 234

25.3.1 Attributes Used for Authentication .......................................................................... 234

25.3.2 Attributes Used for Accounting ............................................................................... 235

Chapter 26
IP Source Guard.................................................................................................................... 239

26.1 IP Source Guard Overview .............................................................................................. 239

26.1.1 DHCP Snooping Overview ..................................................................................... 240

26.1.2 ARP Inspection Overview ...................................................................................... 242

26.2 IP Source Guard .............................................................................................................. 243

26.3 IP Source Guard Static Binding ....................................................................................... 244

26.4 DHCP Snooping .............................................................................................................. 247

26.5 DHCP Snooping Configure .............................................................................................. 251

26.5.1 DHCP Snooping Port Configure ............................................................................. 253

26.5.2 DHCP Snooping VLAN Configure .......................................................................... 254

26.6 ARP Inspection Status ..................................................................................................... 256

26.6.1 ARP Inspection VLAN Status ................................................................................. 257

26.6.2 ARP Inspection Log Status .................................................................................... 258

26.7 ARP Inspection Configure ............................................................................................... 259

26.7.1 ARP Inspection Port Configure .............................................................................. 261

26.7.2 ARP Inspection VLAN Configure ........................................................................... 263

Chapter 27
Loop Guard............................................................................................................................ 265

27.1 Loop Guard Overview ..................................................................................................... 265

27.2 Loop Guard Setup ........................................................................................................... 267

Chapter 28
VLAN Mapping ...................................................................................................................... 269

28.1 VLAN Mapping Overview ............................................................................................... 269

28.1.1 VLAN Mapping Example ........................................................................................ 269

28.2 Enabling VLAN Mapping ................................................................................................. 270

28.3 Configuring VLAN Mapping ............................................................................................. 271

Chapter 29
Layer 2 Protocol Tunneling.................................................................................................. 273

29.1 Layer 2 Protocol Tunneling Overview ............................................................................. 273

29.1.1 Layer 2 Protocol Tunneling Mode .......................................................................... 274

29.2 Configuring Layer 2 Protocol Tunneling .......................................................................... 275

Part IV: IP Application.......................................................................... 279

Advertising