i
Table of Contents
1 MAC Address Authentication Configuration ··························································································1-1
MAC Address Authentication Overview ··································································································1-1
Performing MAC Address Authentication on a RADIUS Server ·····················································1-1
Performing MAC Address Authentication Locally ···········································································1-1
Related Concepts····································································································································1-2
MAC Address Authentication Timers ······························································································1-2
Quiet MAC Address·························································································································1-2
Configuring Basic MAC Address Authentication Functions ····································································1-2
MAC Address Authentication Enhanced Function Configuration ···························································1-3
MAC Address Authentication Enhanced Function Configuration Task List ····································1-3
Configuring a Guest VLAN ··············································································································1-4
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port
·························································································································································1-6
Displaying and Maintaining MAC Address Authentication Configuration ···············································1-7
MAC Address Authentication Configuration Examples···········································································1-7