beautypg.com

Part iv: ip application – ZyXEL Communications ZyXEL Dimension GS-2024 User Manual

Page 15

background image

Table of Contents

GS-2024 User’s Guide

15

Chapter 18
Multicast ................................................................................................................................ 125

18.1 Multicast Overview ......................................................................................................... 125

18.1.1 IP Multicast Addresses ........................................................................................... 125
18.1.2 IGMP Filtering ........................................................................................................ 125
18.1.3 IGMP Snooping ..................................................................................................... 125
18.1.4 IGMP Snooping and VLANs ................................................................................... 126

18.2 Multicast Status .............................................................................................................. 126
18.3 Multicast Setting ............................................................................................................. 126
18.4 IGMP Snooping VLAN .................................................................................................... 128
18.5 IGMP Filtering Profile ..................................................................................................... 130
18.6 MVR Overview ................................................................................................................ 131

18.6.1 Types of MVR Ports ............................................................................................... 131
18.6.2 MVR Modes ........................................................................................................... 132
18.6.3 How MVR Works .................................................................................................... 132

18.7 General MVR Configuration ............................................................................................ 132
18.8 MVR Group Configuration .............................................................................................. 134

18.8.1 MVR Configuration Example .................................................................................. 135

Chapter 19
Authentication & Accounting .............................................................................................. 139

19.1 Authentication, Authorization and Accounting ................................................................ 139

19.1.1 Local User Accounts .............................................................................................. 139
19.1.2 RADIUS and TACACS+ ........................................................................................ 140

19.2 Authentication and Accounting Screens .......................................................................... 140

19.2.1 RADIUS Server Setup ........................................................................................ 140
19.2.2 TACACS+ Server Setup ..................................................................................... 142
19.2.3 Authentication and Accounting Setup ................................................................ 144
19.2.4 Vendor Specific Attribute ........................................................................................ 147
19.2.5 Tunnel Protocol Attribute ........................................................................................ 148

19.3 Supported RADIUS Attributes ......................................................................................... 148

19.3.1 Attributes Used for Authentication .......................................................................... 149
19.3.2 Attributes Used for Accounting ............................................................................... 149

Chapter 20
Loop Guard............................................................................................................................ 153

20.1 Loop Guard Overview ..................................................................................................... 153
20.2 Loop Guard Setup ........................................................................................................... 155

Part IV: IP Application.......................................................................... 157