Specifications
Correspondence between configuration commands and authentication modes
488
Correspondence between configuration commands and
authentication modes
The following table describes MAC-based authentication modes in which MAC-based
authentication configuration commands can be set.
Table 24-1 Configuration commands and MAC-based authentication modes
MAC-based authentication modes
#3
Command name F D L
aaa accounting mac-authentication Y Y Y
aaa authentication mac-authentication Y Y Y
aaa authentication mac-authentication end-by-reject Y Y --
authentication arp-relay
#1
Y Y N
authentication ip access-group
#1
Y Y N
mac-authentication access-group Y Y Y
mac-authentication authentication Y Y N
mac-authentication auto-logout Y Y Y
mac-authentication force-authorized vlan -- Y Y
mac-authentication id-format Y Y Y
mac-authentication interface -- -- Y
mac-authentication max-timer Y Y Y
mac-authentication max-user -- Y Y
mac-authentication max-user (interface) -- Y Y
mac-authentication password Y Y Y
mac-authentication port
#2
Y Y --
mac-authentication radius-server dead-interval Y Y Y
mac-authentication radius-server host Y Y Y
mac-authentication roaming -- Y --
mac-authentication static-vlan force-authorized Y -- --
mac-authentication static-vlan max-user Y -- --