i
Table of Contents
1 MAC Authentication Configuration··········································································································1-1
MAC Authentication Overview ················································································································1-1
RADIUS-Based MAC Authentication·······························································································1-1
Local MAC Authentication ···············································································································1-1
Related Concepts····································································································································1-2
MAC Authentication Timers·············································································································1-2
Quiet MAC Address·························································································································1-2
VLAN Assigning·······························································································································1-2
ACL Assigning ·································································································································1-2
Configuring MAC Authentication·············································································································1-3
Configuration Prerequisites ·············································································································1-3
Configuration Procedure··················································································································1-3
Displaying and Maintaining MAC Authentication ····················································································1-4
MAC Authentication Configuration Examples ·························································································1-4
Local MAC Authentication Configuration Example ·········································································1-4
RADIUS-Based MAC Authentication Configuration Example ·························································1-6
ACL Assignment Configuration Example ························································································1-8
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...