User's Manual

Table Of Contents
8
Users Manual of CS-6306R
Secure Port Configuration ..................................................................................................................... 188
11.2
11.2.1
Overview ...................................................................................................................................... 188
11.2.2
Configuration Task of the Secure Port ......................................................................................... 188
Configuring the Secure Port .................................................................................................................. 189
11.3
11.3.1
Configuring the Secure Port Mode .............................................................................................. 189
11.3.2
Configuring the Static MAC Address of the Secure Port ............................................................. 189
Chapter 12. Configuring Port Mirroring 190
Configuring Port Mirroring Task............................................................................................................. 190
12.1
12.1.1
Configuring Port Mirroring ............................................................................................................ 190
12.1.2
Displaying Port Mirroring Information .......................................................................................... 190
Chapter 13. Configuring MAC Address Attribute 191
MAC Address Configuration Task List ................................................................................................... 191
13.1
MAC address Configuration Task.......................................................................................................... 191
13.2
13.2.1
Configuring Static Mac Address ................................................................................................... 191
13.2.2
Configuring MAC Address Aging Time ......................................................................................... 191
13.2.3
Displaying MAC Address Table .................................................................................................... 192
13.2.4
Clearing Dynamic MAC Address ................................................................................................. 192
Chapter 14. Configuring MAC List 193
MAC List Configuration Task ................................................................................................................. 193
14.1
14.1.1
Creating MAC List ........................................................................................................................ 193
14.1.2
Configuring Items of MAC List ..................................................................................................... 193
14.1.3
Applying MAC List ....................................................................................................................... 194
Chapter 15. Configuring 802.1x 195
802.1x Configuration Task List .............................................................................................................. 195
15.1
802.1x Configuration Task..................................................................................................................... 195
15.2
15.2.1
Configuring 802.1x Port Authentication ....................................................................................... 195
15.2.2
Configuring 802.1x Multiple Port Authentication .......................................................................... 196
15.2.3
Configuring Maximum Times for 802.1x ID Authentication .......................................................... 197
15.2.4
Configuring 802.1x Re-authentication ......................................................................................... 197
15.2.5
Configuring 802.1x Transmission Frequency .............................................................................. 197
15.2.6
Configuring 802.1x User Binding ................................................................................................. 197
15.2.7
Configuring Authentication Method for 802.1x Port ..................................................................... 198
15.2.8
Selecting Authentication Type for 802.1x Port ............................................................................. 198
15.2.9
Configuring 802.1x Accounting .................................................................................................... 198
15.2.10
Configuring 802.1x guest-vlan ..................................................................................................... 199
15.2.11
Forbidding Supplicant with Multiple Network Cards .................................................................... 199
15.2.12
Resuming Default 802.1x Configuration ...................................................................................... 199
15.2.13
Monitoring 802.1x Authentication Configuration and State .......................................................... 200
802.1x Configuration Example .............................................................................................................. 200
15.3
Chapter 16.
VLAN Configuration 201