beautypg.com

H3C Technologies H3C S3100 Series Switches User Manual

Page 455

background image

i

Table of Contents

1 MAC Authentication Configuration··········································································································1-1

MAC Authentication Overview ················································································································1-1

Performing MAC Authentication on a RADIUS Server····································································1-1

Performing MAC Authentication Locally··························································································1-1

Related Concepts····································································································································1-2

MAC Authentication Timers·············································································································1-2

Quiet MAC Address·························································································································1-2

Configuring Basic MAC Authentication Functions ··················································································1-2

MAC Address Authentication Enhanced Function Configuration ···························································1-4

MAC Address Authentication Enhanced Function Configuration Tasks ·········································1-4

Configuring a Guest VLAN or Auth-Fail VLAN ················································································1-4

Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port

·························································································································································1-6

Configuring the Quiet MAC Function on a Port ···············································································1-7

Displaying and Debugging MAC Authentication ·····················································································1-7

MAC Authentication Configuration Example···························································································1-8