215
Usage guidelines
The MAC authentication critical voice VLAN on a port accommodates MAC authentication voice
users that have failed authentication because none of the RADIUS servers in their ISP domain are
reachable.
Before you enable the MAC authentication critical voice VLAN on the port, make sure the following
requirements are met:
•
The port is configured with the voice VLAN.
To configure a voice VLAN on a port, use the
voice-vlan enable
command (see
Layer 2—LAN
Switching Command Reference
).
•
LLDP is enabled both globally and on the port.
The device uses LLDP to identify voice users. For information about LLDP commands, see
Layer 2—LAN Switching Command Reference
.
Examples
# Enable the MAC authentication critical voice VLAN on Ten-GigabitEthernet 1/0/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/0/1
[Sysname-Ten-GigabitEthernet1/0/1] mac-authentication critical-voice-vlan
Related commands
display mac-authentication
lldp enable
(
Layer 2—LAN Switching Command Reference
)
lldp global enable
(
Layer 2—LAN Switching Command Reference
)
reset mac-authentication critical-voice-vlan
voice-vlan enable
(
Layer 2—LAN Switching Command Reference
)
mac-authentication domain
Use
mac-authentication domain
to specify a global or port-specific authentication domain.
Use
undo mac-authentication domain
to restore the default.
Syntax
mac-authentication domain domain-name
undo mac-authentication domain
Default
The system default authentication domain is used. For more information about the default
authentication domain, see the
domain default enable
command in "AAA commands."
Views
System view
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
mdc-admin
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...