beautypg.com

Part iv: ip application – ZyXEL Communications XGS-4728F User Manual

Page 17

background image

Table of Contents

XGS-4728F User’s Guide

17

25.2.5 Tunnel Protocol Attribute ........................................................................................ 225

25.3 Supported RADIUS Attributes ......................................................................................... 226

25.3.1 Attributes Used for Authentication .......................................................................... 226

25.3.2 Attributes Used for Accounting ............................................................................... 227

Chapter 26
IP Source Guard.................................................................................................................... 231

26.1 IP Source Guard Overview .............................................................................................. 231

26.1.1 DHCP Snooping Overview ..................................................................................... 232

26.1.2 ARP Inspection Overview ...................................................................................... 234

26.2 IP Source Guard .............................................................................................................. 235

26.3 IP Source Guard Static Binding ....................................................................................... 236

26.4 DHCP Snooping .............................................................................................................. 238

26.5 DHCP Snooping Configure .............................................................................................. 241

26.5.1 DHCP Snooping Port Configure ............................................................................. 243

26.5.2 DHCP Snooping VLAN Configure .......................................................................... 244

26.6 ARP Inspection Status ..................................................................................................... 246

26.6.1 ARP Inspection VLAN Status ................................................................................. 247

26.6.2 ARP Inspection Log Status .................................................................................... 248

26.7 ARP Inspection Configure ............................................................................................... 249

26.7.1 ARP Inspection Port Configure .............................................................................. 251

26.7.2 ARP Inspection VLAN Configure ........................................................................... 253

Chapter 27
Loop Guard............................................................................................................................ 255

27.1 Loop Guard Overview ..................................................................................................... 255

27.2 Loop Guard Setup ........................................................................................................... 257

Chapter 28
VLAN Mapping ...................................................................................................................... 259

28.1 VLAN Mapping Overview ............................................................................................... 259

28.1.1 VLAN Mapping Example ........................................................................................ 259

28.2 Enabling VLAN Mapping ................................................................................................. 260

28.3 Configuring VLAN Mapping ............................................................................................. 261

Chapter 29
Layer 2 Protocol Tunneling.................................................................................................. 263

29.1 Layer 2 Protocol Tunneling Overview ............................................................................. 263

29.1.1 Layer 2 Protocol Tunneling Mode .......................................................................... 264

29.2 Configuring Layer 2 Protocol Tunneling .......................................................................... 265

Part IV: IP Application.......................................................................... 267