User manual
Table of Contents
GS2210 Series User’s Guide
13
26.9 ARP Inspection Log Status ......................................................................................................... 238
26.10 ARP Inspection Configure ........................................................................................................ 240
26.10.1 ARP Inspection Port Configure ...................................................................................... 241
26.10.2 ARP Inspection VLAN Configure ................................................................................... 242
26.11 IPv6 Source Guard Overview ................................................................................................. 243
26.12 IPv6 Source Binding Status ....................................................................................................... 244
26.13 IPv6 Static Binding Setup ........................................................................................................ 245
26.14 IPv6 Source Guard Policy Setup ............................................................................................ 246
26.15 IPv6 Source Guard Port Setup ................................................................................................ 247
26.16 IPv6 Snooping Policy Setup .................................................................................................... 248
26.17 IPv6 Snooping VLAN Setup ..................................................................................................... 250
26.18 IPv6 DHCP Trust Setup ............................................................................................................. 250
26.19 Technical Reference ................................................................................................................ 252
26.19.1 DHCP Snooping Overview ............................................................................................. 252
26.19.2 ARP Inspection Overview ............................................................................................... 253
Chapter 27
Loop Guard ......................................................................................................................................256
27.1 Loop Guard Overview .............................................................................................................. 256
27.1.1 What You Can Do ............................................................................................................. 256
27.1.2 What You Need to Know ................................................................................................. 256
27.2 Loop Guard Setup ...................................................................................................................... 258
Chapter 28
VLAN Mapping.................................................................................................................................260
28.1 VLAN Mapping Overview ......................................................................................................... 260
28.1.1 VLAN Mapping Example .................................................................................................. 260
28.2 Enabling VLAN Mapping ........................................................................................................... 261
28.3 Configuring VLAN Mapping ...................................................................................................... 262
Chapter 29
Layer 2 Protocol Tunneling..............................................................................................................264
29.1 Layer 2 Protocol Tunneling Overview ......................................................................................264
29.1.1 What You Can Do ............................................................................................................. 264
29.1.2 What You Need to Know ................................................................................................. 264
29.2 Configuring Layer 2 Protocol Tunneling ................................................................................... 265
Chapter 30
PPPoE.................................................................................................................................................268
30.1 PPPoE Intermediate Agent Overview ..................................................................................... 268
30.1.1 What You Can Do ............................................................................................................. 268
30.1.2 What You Need to Know ................................................................................................. 268
30.2 PPPoE Screen .............................................................................................................................. 270