beautypg.com
13
49.6.2 MLD Configuration Task List ............................................................................................. 49-25
49.6.3 MLD Typical Application .................................................................................................... 49-26
49.6.4 MLD Troubleshooting Help................................................................................................ 49-27
49.7
MLD
S
NOOPING
............................................................................................................................ 49-27
49.7.1 Introduction to MLD Snooping........................................................................................... 49-27
49.7.2 MLD Snooping Configuration Task.................................................................................... 49-28
49.7.3 MLD Snooping Examples .................................................................................................. 49-29
49.7.4 MLD Snooping Troubleshooting ........................................................................................ 49-32
CHAPTER 50 MULTICAST VLAN .................................................................................50-1
50.1
I
NTRODUCTIONS TO
M
ULTICAST
VLAN ............................................................................................. 50-1
50.2
VLAN
C
ONFIGURATION
T
ASK
L
IST
................................................................................. 50-1
50.3
E
XAMPLES
.......................................................................................................... 50-2
CHAPTER 51 ACL CONFIGURATION ..........................................................................51-1
51.1
NTRODUCTION TO
ACL.................................................................................................................... 51-1
51.1.1 Access-list ........................................................................................................................... 51-1
51.1.2 Access-group ...................................................................................................................... 51-1
51.1.3 Access-list Action and Global Default Action....................................................................... 51-1
51.2
ACL
...................................................................................................... 51-2
51.3
XAMPLE
.............................................................................................................................. 51-18
51.4
ROUBLESHOOTING
............................................................................................................... 51-22
CHAPTER 52 802.1X CONFIGURATION ......................................................................52-1
52.1
802.1
X
................................................................................................................ 52-1
52.1.1 The Authentication Structure of 802.1x ............................................................................... 52-1
52.1.2 The Work Mechanism of 802.1x ......................................................................................... 52-3
52.1.3 The Encapsulation of EAPOL Messages ............................................................................ 52-3
52.1.4 The Encapsulation of EAP Attributes .................................................................................. 52-5
52.1.5 Web Authentication Proxy based on 802.1x ....................................................................... 52-5
52.1.6 The Extension and Optimization of 802.1x ....................................................................... 52-10
52.1.7 The Features of VLAN Allocation ...................................................................................... 52-11
52.2
................................................................................................ 52-12
52.3
A
PPLICATION
...................................................................................................... 52-14
52.3.1 Examples of Guest Vlan Applications ............................................................................... 52-14
52.3.2 Examples of IPv4 Radius Applications .............................................................................. 52-17
52.3.3 Examples of IPv6 Radius Application ............................................................................... 52-18
52.4
........................................................................................................... 52-19
CHAPTER 53 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN AND IP CONFIGURATION ..........................................................................................................53-1
53.1
NTRODUCTION TO THE
N
UMBER
IMITATION
F
UNCTION OF
P
ORT
,
MAC
IN
AND
IP .................... 53-1