A SERVICE OF

logo

Table of Contents
GS2210 Series User’s Guide
11
24.1.2 What You Need to Know ......................................................................................................192
24.2 AAA Screens .................................................................................................................................193
24.3 RADIUS Server Setup ...............................................................................................................193
24.4 TACACS+ Server Setup ............................................................................................................195
24.5 AAA Setup ....................................................................................................................................197
24.6 Technical Reference ......................................................................................................................200
24.6.1 Vendor Specific Attribute .....................................................................................................200
24.6.2 Supported RADIUS Attributes .............................................................................................201
24.6.3 Attributes Used for Authentication .......................................................................................202
Chapter 25
IP Source Guard................................................................................................................................203
25.1 Overview .......................................................................................................................................203
25.1.1 What You Can Do ................................................................................................................203
25.1.2 What You Need to Know ......................................................................................................204
25.2 IP Source Guard ..........................................................................................................................204
25.3 IP Source Guard Static Binding ....................................................................................................205
25.4 DHCP Snooping ...........................................................................................................................206
25.5 DHCP Snooping Configure ..........................................................................................................209
25.5.1 DHCP Snooping Port Configure ......................................................................................... 211
25.5.2 DHCP Snooping VLAN Configure ......................................................................................213
25.5.3 DHCP Snooping VLAN Port Configure ................................................................................213
25.6 ARP Inspection Status .................................................................................................................215
25.7 ARP Inspection VLAN Status ........................................................................................................216
25.8 ARP Inspection Log Status ...........................................................................................................216
25.9 ARP Inspection Configure .............................................................................................................218
25.9.1 ARP Inspection Port Configure ............................................................................................219
25.9.2 ARP Inspection VLAN Configure .........................................................................................221
25.10 Technical Reference ....................................................................................................................222
25.10.1 DHCP Snooping Overview ................................................................................................222
25.10.2 ARP Inspection Overview ..................................................................................................224
Chapter 26
Loop Guard .......................................................................................................................................226
26.1 Loop Guard Overview ..................................................................................................................226
26.1.1 What You Can Do ................................................................................................................226
26.1.2 What You Need to Know ......................................................................................................226
26.2 Loop Guard Setup .........................................................................................................................228
Chapter 27
Layer 2 Protocol Tunneling..............................................................................................................230
27.1 Layer 2 Protocol Tunneling Overview ..........................................................................................230
27.1.1 What You Can Do ................................................................................................................230