iv
Hardware compatibility with EAD fast deployment ························································································ 108
Configuration prerequisites ···························································································································· 109
Configuring a free IP ······································································································································ 109
Configuring the redirect URL ························································································································· 109
Setting the EAD rule timer ····························································································································· 109
Displaying and maintaining EAD fast deployment ························································································· 110
EAD fast deployment configuration example ································································································· 110
Network requirements ···························································································································· 110
Configuration procedure ························································································································· 111
Verifying the configuration ······················································································································ 112
Troubleshooting EAD fast deployment ·········································································································· 112
Web browser users cannot be correctly redirected ················································································ 112
Configuring MAC authentication ································································· 114
Overview ························································································································································ 114
User account policies ····························································································································· 114
Authentication methods ·························································································································· 114
MAC authentication timers ····················································································································· 115
Using MAC authentication with other features ······························································································· 115
VLAN assignment ·································································································································· 115
ACL assignment ····································································································································· 115
Configuration task list ····································································································································· 116
Basic configuration for MAC authentication ··································································································· 116
Configuring MAC authentication globally ······························································································· 116
Configuring MAC authentication on a port ····························································································· 117
Specifying a MAC authentication domain ······································································································ 118
Configuring MAC authentication delay ··········································································································· 118
Displaying and maintaining MAC authentication ···························································································· 119
MAC authentication configuration examples ·································································································· 119
Local MAC authentication configuration example ·················································································· 119
RADIUS-based MAC authentication configuration example ·································································· 120
ACL assignment configuration example································································································· 122
Configuring port security ············································································· 125
Overview ························································································································································ 125
Port security features ····························································································································· 125
Port security modes ······························································································································· 125
Support for WLAN ·································································································································· 128
Working with guest VLAN and Auth-Fail VLAN ······················································································ 129
Configuration task list ····································································································································· 129
Enabling port security ···································································································································· 129
Setting port security's limit on the number of MAC addresses on a port ······················································· 130
Setting the port security mode ······················································································································· 130
Configuration prerequisites ···················································································································· 131
Configuration procedure ························································································································· 131
Configuring port security features ·················································································································· 132
Configuring NTK ····································································································································· 132
Configuring intrusion protection ············································································································· 133
Enabling port security traps ···················································································································· 133
Configuring secure MAC addresses ·············································································································· 134
Configuration prerequisites ···················································································································· 135
Configuration procedure ························································································································· 135
Configuring port security for WLAN ports ······································································································ 135
Setting the port security mode of a WLAN port ······················································································ 136
Enabling key negotiation ························································································································ 136
Configuring a PSK ·································································································································· 137
Ignoring authorization information from the server ························································································ 137
Displaying and maintaining port security ······································································································· 137
Port security configuration examples ············································································································· 138
Configuring the autoLearn mode ············································································································ 138
Configuring the userLoginWithOUI mode ······························································································ 140
Configuring the macAddressElseUserLoginSecure mode ····································································· 144