i 
Table of Contents 
1 MAC Authentication Configuration··········································································································1-1 
MAC Authentication Overview ················································································································1-1 
Performing MAC Authentication on a RADIUS Server····································································1-1 
Performing MAC Authentication Locally··························································································1-1 
Related Concepts····································································································································1-2 
MAC Authentication Timers·············································································································1-2 
Quiet MAC Address·························································································································1-2 
Configuring Basic MAC Authentication Functions ··················································································1-2 
MAC Address Authentication Enhanced Function Configuration ···························································1-3 
MAC Address Authentication Enhanced Function Configuration Tasks·········································1-3 
Configuring a Guest VLAN··············································································································1-4 
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port
·························································································································································
1-5 
Configuring the Quiet MAC Function on a Port···············································································1-6 
Displaying and Debugging MAC Authentication·····················································································1-6 
MAC Authentication Configuration Example···························································································1-7