i
Table of Contents
1 MAC Authentication Configuration··········································································································1-1
MAC Authentication Overview ················································································································1-1
RADIUS-Based MAC Authentication·······························································································1-1
Local MAC Authentication···············································································································1-1
Related Concepts····································································································································1-2
MAC Authentication Timers·············································································································1-2
Quiet MAC Address·························································································································1-2
VLAN Assigning·······························································································································1-2
ACL Assigning·································································································································1-2
Guest VLAN of MAC Authentication································································································1-2
Configuring MAC Authentication·············································································································1-3
Configuration Prerequisites·············································································································1-3
Configuration Procedure··················································································································1-3
Configuring a Guest VLAN······················································································································1-4
Configuration Prerequisites·············································································································1-4
Configuration Procedure··················································································································1-4
Displaying and Maintaining MAC Authentication····················································································1-5
MAC Authentication Configuration Examples·························································································1-5
Local MAC Authentication Configuration Example ·········································································1-5
RADIUS-Based MAC Authentication Configuration Example·························································1-7
ACL Assignment Configuration Example ························································································1-8