EasyManua.ls Logo

3Com 4210 9-Port - Mac Authentication Configuration

3Com 4210 9-Port
870 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
i
Table of Contents
1 MAC Authentication Configuration··········································································································1-1
MAC Authentication Overview ················································································································1-1
Performing MAC Authentication on a RADIUS Server····································································1-1
Performing MAC Authentication Locally··························································································1-1
Related Concepts····································································································································1-2
MAC Authentication Timers·············································································································1-2
Quiet MAC Address·························································································································1-2
Configuring Basic MAC Authentication Functions ··················································································1-2
MAC Address Authentication Enhanced Function Configuration ···························································1-3
MAC Address Authentication Enhanced Function Configuration Tasks·········································1-3
Configuring a Guest VLAN··············································································································1-4
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port
·························································································································································
1-5
Configuring the Quiet MAC Function on a Port···············································································1-6
Displaying and Debugging MAC Authentication·····················································································1-6
MAC Authentication Configuration Example···························································································1-7

Table of Contents

Related product manuals