EasyManua.ls Logo

H3C S3100 8C SI - Mac Authentication Configuration

H3C S3100 8C SI
944 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Operation Manual – MAC Address Authentication
H3C S3100 Series Ethernet Switches Table of Contents
i
Table of Contents
Chapter 1 MAC Authentication Configuration............................................................................ 1-1
1.1 MAC Authentication Overview........................................................................................... 1-1
1.1.1 Performing MAC Authentication on a RADIUS Server ........................................... 1-1
1.1.2 Performing MAC Authentication Locally ................................................................. 1-1
1.2 Related Concepts .............................................................................................................. 1-2
1.2.1 MAC Authentication Timers .................................................................................... 1-2
1.2.2 Quiet MAC Address ................................................................................................1-2
1.3 Configuring Basic MAC Authentication Functions............................................................. 1-3
1.4 MAC Address Authentication Enhanced Function Configuration...................................... 1-4
1.4.1 MAC Address Authentication Enhanced Function Configuration Tasks................. 1-4
1.4.2 Configuring a Guest VLAN...................................................................................... 1-5
1.4.3 Configuring the Maximum Number of MAC Address Authentication Users Allowed to
Access a Port ...................................................................................................................
1-7
1.4.4 Configuring the Quiet MAC Function on a Port....................................................... 1-8
1.5 Displaying and Debugging MAC Authentication................................................................ 1-8
1.6 MAC Authentication Configuration Example ..................................................................... 1-9

Table of Contents

Related product manuals