24 Contents
Port Access Control History Log Summary . . . . 519
Port Security . . . . . . . . . . . . . . . . . . . 520
Internal Authentication Server Users
Configuration
. . . . . . . . . . . . . . . . . . . 522
Configuring Port-Based Security (CLI)
. . . . . . . . . 524
Configuring Basic 802.1X Authentication
Settings . . . . . . . . . . . . . . . . . . . . . . 524
Configuring Additional 802.1X Interface
Settings
. . . . . . . . . . . . . . . . . . . . . . 526
Configuring 802.1X Settings for RADIUS-
Assigned VLANs
. . . . . . . . . . . . . . . . . 528
Configuring Port Security . . . . . . . . . . . . . 529
Configuring Internal Authentication
Server Users
. . . . . . . . . . . . . . . . . . . 530
Port-Based Security Configuration Examples
. . . . . 531
Configuring 802.1X Authentication
. . . . . . . . 531
Configuring MAC-Based Authentication
Mode
. . . . . . . . . . . . . . . . . . . . . . . 535
Allowing RADIUS-Assigned VLANs and
a Guest VLAN
. . . . . . . . . . . . . . . . . . . 536
Configuring Authentication Server
Filter Assignments
. . . . . . . . . . . . . . . . 537
20 Configuring Access Control Lists . . . . . 539
ACL Overview . . . . . . . . . . . . . . . . . . . . . 539
What Are MAC ACLs?
. . . . . . . . . . . . . . 540
What Are IP ACLs?
. . . . . . . . . . . . . . . . 541
What Is the ACL Redirect Function? . . . . . . . 541
What Is the ACL Mirror Function? . . . . . . . . 541
What Is ACL Logging
. . . . . . . . . . . . . . . 542
What Are Time-Based ACLs?
. . . . . . . . . . . 542