Table of Contents
MES-3728 User’s Guide
16
21.4 Configuring VLAN Stacking ............................................................................................. 172
Chapter 22
Multicast ................................................................................................................................ 175
22.1 Multicast Overview ......................................................................................................... 175
22.1.1 IP Multicast Addresses ........................................................................................... 175
22.1.2 IGMP Filtering ........................................................................................................ 175
22.1.3 IGMP Snooping ..................................................................................................... 175
22.1.4 IGMP Snooping and VLANs ................................................................................... 176
22.2 Multicast Status .............................................................................................................. 176
22.3 Multicast Setting ............................................................................................................. 176
22.4 IGMP Snooping VLAN .................................................................................................... 178
22.5 IGMP Filtering Profile ..................................................................................................... 180
22.6 MVR Overview ................................................................................................................ 181
22.6.1 Types of MVR Ports ............................................................................................... 181
22.6.2 MVR Modes ........................................................................................................... 182
22.6.3 How MVR Works .................................................................................................... 182
22.7 General MVR Configuration ............................................................................................ 182
22.8 MVR Group Configuration .............................................................................................. 184
22.8.1 MVR Configuration Example .................................................................................. 185
Chapter 23
Authentication & Accounting .............................................................................................. 189
23.1 Authentication, Authorization and Accounting ................................................................ 189
23.1.1 Local User Accounts .............................................................................................. 189
23.1.2 RADIUS and TACACS+ ........................................................................................ 190
23.2 Authentication and Accounting Screens .......................................................................... 190
23.2.1 RADIUS Server Setup ........................................................................................ 190
23.2.2 TACACS+ Server Setup ..................................................................................... 192
23.2.3 Authentication and Accounting Setup ................................................................ 194
23.2.4 Vendor Specific Attribute ........................................................................................ 197
23.3 Supported RADIUS Attributes ......................................................................................... 198
23.3.1 Attributes Used for Authentication .......................................................................... 199
23.3.2 Attributes Used for Accounting ............................................................................... 199
Chapter 24
IP Source Guard.................................................................................................................... 203
24.1 IP Source Guard Overview .............................................................................................. 203
24.1.1 DHCP Snooping Overview ..................................................................................... 203
24.1.2 ARP Inspection Overview ...................................................................................... 205
24.2 IP Source Guard .............................................................................................................. 207
24.3 IP Source Guard Static Binding ....................................................................................... 207
24.4 DHCP Snooping .............................................................................................................. 209