Table of Contents
ES3500 Series User’s Guide
11
25.2.2 TACACS+ Server Setup .....................................................................................206
25.2.3 AAA Setup ..............................................................................................................208
25.2.4 Vendor Specific Attribute ........................................................................................210
25.2.5 Tunnel Protocol Attribute ........................................................................................ 211
25.3 Supported RADIUS Attributes .......................................................................................... 211
25.3.1 Attributes Used for Authentication ..........................................................................212
25.3.2 Attributes Used for Accounting ...............................................................................212
Chapter 26IP Source Guard.................................................................................................................... 215
26.1 IP Source Guard Overview ..............................................................................................215
26.1.1 DHCP Snooping Overview .....................................................................................215
26.1.2 ARP Inspection Overview .......................................................................................217
26.2 IP Source Guard ..............................................................................................................219
26.3 IP Source Guard Static Binding ........................................................................................219
26.4 DHCP Snooping ...............................................................................................................221
26.5 DHCP Snooping Configure ..............................................................................................223
26.5.1 DHCP Snooping Port Configure .............................................................................225
26.5.2 DHCP Snooping VLAN Configure ..........................................................................226
26.6 ARP Inspection Status .....................................................................................................227
26.6.1 ARP Inspection VLAN Status .................................................................................228
26.6.2 ARP Inspection Log Status .....................................................................................229
26.7 ARP Inspection Configure ................................................................................................230
26.7.1 ARP Inspection Port Configure ...............................................................................231
26.7.2 ARP Inspection VLAN Configure ............................................................................233
Chapter 27Loop Guard ........................................................................................................................... 234
27.1 Loop Guard Overview .....................................................................................................234
27.2 Loop Guard Setup ............................................................................................................236
Chapter 28VLAN Mapping ...................................................................................................................... 238
28.1 VLAN Mapping Overview ................................................................................................238
28.1.1 VLAN Mapping Example ........................................................................................238
28.2 Enabling VLAN Mapping ..................................................................................................239
28.3 Configuring VLAN Mapping ..............................................................................................240
Chapter 29Layer 2 Protocol Tunneling.................................................................................................. 242
29.1 Layer 2 Protocol Tunneling Overview .............................................................................242
29.1.1 Layer-2 Protocol Tunneling Mode ...........................................................................243
29.2 Configuring Layer 2 Protocol Tunneling ...........................................................................244