+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
38.1.6 The Features of VLAN Allocation ......................................................... 38-291
38.2 802.1X CONFIGURATION TASK LIST ....................................................................... 38-292
38.3 802.1X APPLICATION EXAMPLE ............................................................................. 38-295
38.3.1 Examples of Guest Vlan Applications ................................................. 38-295
38.3.2 Examples of IPv4 Radius Applications ................................................ 38-298
38.3.3 Examples of IPv6 Radius Application .................................................. 38-299
38.4 802.1X TROUBLESHOOTING .................................................................................. 38-300
CHAPTER 39 THE NUMBER LIMITATION FUNCTION OF MAC IN PORT
CONFIGURATION ...................................................................................... 39-301
39.1 INTRODUCTION TO THE NUMBER LIMITATION FUNCTION OF MAC IN PORT ................. 39-301
39.2 THE NUMBER LIMITATION FUNCTION OF MAC IN PORT CONFIGURATION TASK SEQUENCE
................................................................................................................................... 39-302
39.3 THE NUMBER LIMITATION FUNCTION OF MAC IN PORT TYPICAL EXAMPLES .............. 39-303
39.4 THE NUMBER LIMITATION FUNCTION OF MAC IN PORT TROUBLESHOOTING HELP ..... 39-303
CHAPTER 40 OPERATIONAL CONFIGURATION OF AM FUNCTION ..... 40-305
40.1 INTRODUCTION TO AM FUNCTION .......................................................................... 40-305
40.2 AM FUNCTION CONFIGURATION TASK LIST ............................................................ 40-305
40.3 AM FUNCTION EXAMPLE....................................................................................... 40-307
40.4 AM FUNCTION TROUBLESHOOTING ....................................................................... 40-307
CHAPTER 41 SECURITY FEATURE CONFIGURATION .......................... 41-308
41.1 INTRODUCTION TO SECURITY FEATURE .................................................................. 41-308
41.2 SECURITY FEATURE CONFIGURATION ..................................................................... 41-308
41.2.1 Prevent IP Spoofing Function Configuration Task Sequence ........... 41-308
41.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task
Sequence........................................................................................................... 41-308
41.2.3 Anti Port Cheat Function Configuration Task Sequence ................... 41-309
41.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence . 41-
309
41.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence 41-
309
41.3 SECURITY FEATURE EXAMPLE ............................................................................... 41-310
CHAPTER 42 TACACS+ CONFIGURATION ............................................. 42-311
42.1 INTRODUCTION TO TACACS+ ............................................................................... 42-311
42.2 TACACS+ CONFIGURATION TASK LIST ................................................................. 42-311