Contents 23
How Does the Authentication Server Assign
DiffServ Filters?
. . . . . . . . . . . . . . . . . . . 477
What is the Internal Authentication Server?. . . . 477
Default 802.1X Values
. . . . . . . . . . . . . . . . 478
Configuring IEEE 802.1X (Web) . . . . . . . . . . . 479
Configuring IEEE 802.1X (CLI) . . . . . . . . . . . . 488
Configuring Internal Authentication Server
Users
. . . . . . . . . . . . . . . . . . . . . . . . 493
IEEE 802.1X Configuration Examples . . . . . . . . 493
Port Security (Port-MAC Locking)
. . . . . . . . . . . . 507
Default 802.1X Values
. . . . . . . . . . . . . . . . 507
Configuring Port Security (CLI)
. . . . . . . . . . . 510
Denial of Service
. . . . . . . . . . . . . . . . . . . . 511
21 Configuring Access Control Lists . . . . . 513
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 513
What Are MAC ACLs?
. . . . . . . . . . . . . . . 514
What Are IP ACLs? . . . . . . . . . . . . . . . . . 515
What Is the ACL Redirect Function?
. . . . . . . . 515
What Is the ACL Mirror Function? . . . . . . . . . 515
What Is ACL Logging . . . . . . . . . . . . . . . . 516
What Are Time-Based ACLs?
. . . . . . . . . . . . 516
What Are the ACL Limitations? . . . . . . . . . . . 517
How Are ACLs Configured?
. . . . . . . . . . . . . 518
Preventing False ACL Matches
. . . . . . . . . . . 518
Configuring ACLs (Web)
. . . . . . . . . . . . . . . . . 520
IP ACL Configuration
. . . . . . . . . . . . . . . . 520
IP ACL Rule Configuration
. . . . . . . . . . . . . 522
MAC ACL Configuration . . . . . . . . . . . . . . 524
MAC ACL Rule Configuration . . . . . . . . . . . . 526
IPv6 ACL Configuration . . . . . . . . . . . . . . . 527