Chapter 45 multicast vlan -1, Chapter 46 acl configuration -1 – PLANET XGS3-24040 User Manual
Page 14

12
44.7.4 MLD Snooping Troubleshooting
........................................................................................ 44-33
.................................................................................45-1
............................................................................................. 45-1
................................................................................. 45-1
..........................................................................46-1
46.1.3 Access-list Action and Global Default Action
....................................................................... 46-1
CHAPTER 47 802.1X CONFIGURATION
......................................................................47-1
47.1.1 The Authentication Structure of 802.1x
............................................................................... 47-1
47.1.2 The Work Mechanism of 802.1x
......................................................................................... 47-3
47.1.3 The Encapsulation of EAPOL Messages
............................................................................ 47-3
47.1.4 The Encapsulation of EAP Attributes
.................................................................................. 47-5
47.1.5 Web Authentication Proxy based on 802.1x
....................................................................... 47-5
47.1.6 The Authentication Methods of 802.1x
................................................................................ 47-6
47.1.7 The Extension and Optimization of 802.1x
....................................................................... 47-11
47.1.8 The Features of VLAN Allocation
...................................................................................... 47-12
47.3.1 Examples of Guest Vlan Applications
............................................................................... 47-16
47.3.2 Examples of IPv4 Radius Applications
.............................................................................. 47-19
47.3.3 Examples of IPv6 Radius Application
............................................................................... 47-20
47.3.4 802.1x Web Proxy Authentication Sample Application
..................................................... 47-21
CHAPTER 48 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN AND IP
CONFIGURATION