i
Table of Contents
1 MAC Address Authentication Configuration··························································································1-1
MAC Address Authentication Overview··································································································1-1
Performing MAC Address Authentication on a RADIUS Server·····················································1-1
Performing MAC Address Authentication Locally··········································································· 1-1
Related Concepts····································································································································1-2
MAC Address Authentication Timers······························································································ 1-2
Quiet MAC Address·························································································································1-2
Configuring Basic MAC Address Authentication Functions····································································1-2
MAC Address Authentication Enhanced Function Configuration···························································1-3
MAC Address Authentication Enhanced Function Configuration Task List····································1-3
Configuring a Guest VLAN··············································································································1-4
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port
·························································································································································1-6
Displaying and Maintaining MAC Address Authentication Configuration···············································1-7
MAC Address Authentication Configuration Examples···········································································1-7