
Table of Contents
XGS-4728F User’s Guide
17
25.2.4 Vendor Specific Attribute ........................................................................................ 224
25.2.5 Tunnel Protocol Attribute ........................................................................................ 225
25.3 Supported RADIUS Attributes ......................................................................................... 226
25.3.1 Attributes Used for Authentication .......................................................................... 226
25.3.2 Attributes Used for Accounting ............................................................................... 227
Chapter 26
IP Source Guard....................................................................................................................231
26.1 IP Source Guard Overview .............................................................................................. 231
26.1.1 DHCP Snooping Overview ..................................................................................... 232
26.1.2 ARP Inspection Overview ...................................................................................... 234
26.2 IP Source Guard .............................................................................................................. 235
26.3 IP Source Guard Static Binding ....................................................................................... 236
26.4 DHCP Snooping .............................................................................................................. 238
26.5 DHCP Snooping Configure .............................................................................................. 241
26.5.1 DHCP Snooping Port Configure ............................................................................. 243
26.5.2 DHCP Snooping VLAN Configure .......................................................................... 244
26.6 ARP Inspection Status .....................................................................................................246
26.6.1 ARP Inspection VLAN Status ................................................................................. 247
26.6.2 ARP Inspection Log Status .................................................................................... 248
26.7 ARP Inspection Configure ............................................................................................... 249
26.7.1 ARP Inspection Port Configure .............................................................................. 251
26.7.2 ARP Inspection VLAN Configure ........................................................................... 253
Chapter 27
Loop Guard............................................................................................................................255
27.1 Loop Guard Overview ..................................................................................................... 255
27.2 Loop Guard Setup ........................................................................................................... 257
Chapter 28
VLAN Mapping ......................................................................................................................259
28.1 VLAN Mapping Overview ............................................................................................... 259
28.1.1 VLAN Mapping Example ........................................................................................ 259
28.2 Enabling VLAN Mapping ................................................................................................. 260
28.3 Configuring VLAN Mapping ............................................................................................. 261
Chapter 29
Layer 2 Protocol Tunneling..................................................................................................263
29.1 Layer 2 Protocol Tunneling Overview ............................................................................. 263
29.1.1 Layer 2 Protocol Tunneling Mode .......................................................................... 264
29.2 Configuring Layer 2 Protocol Tunneling .......................................................................... 265
Chapter 30
Private VLAN .........................................................................................................................267