User's Manual

Table Of Contents
Configuration Guide of SGS-6341-Series
1-13
49.5.1 Introduction to IPv6 DCSCM ............................................................................................. 49-20
49.5.2 IPv6 DCSCM Configuration Task Sequence ..................................................................... 49-21
49.5.3 IPv6 DCSCM Typical Examples ........................................................................................ 49-23
49.5.4 IPv6 DCSCM Troubleshooting .......................................................................................... 49-24
49.6 MLD ............................................................................................................................................. 49-24
49.6.1 Introduction to MLD ........................................................................................................... 49-24
49.6.2 MLD Configuration Task List ............................................................................................. 49-25
49.6.3 MLD Typical Application .................................................................................................... 49-26
49.6.4 MLD Troubleshooting Help................................................................................................ 49-27
49.7 MLD SNOOPING ............................................................................................................................ 49-28
49.7.1 Introduction to MLD Snooping........................................................................................... 49-28
49.7.2 MLD Snooping Configuration Task.................................................................................... 49-28
49.7.3 MLD Snooping Examples .................................................................................................. 49-30
49.7.4 MLD Snooping Troubleshooting ........................................................................................ 49-32
CHAPTER 50 MULTICAST VLAN .................................................................................50-1
50.1 INTRODUCTIONS TO MULTICAST VLAN ............................................................................................. 50-1
50.2 MULTICAST VLAN CONFIGURATION TASK LIST ................................................................................. 50-1
50.3 MULTICAST VLAN EXAMPLES .......................................................................................................... 50-2
CHAPTER 51 ACL CONFIGURATION ..........................................................................51-1
51.1 INTRODUCTION TO ACL.................................................................................................................... 51-1
51.1.1 Access-list ........................................................................................................................... 51-1
51.1.2 Access-group ...................................................................................................................... 51-1
51.1.3 Access-list Action and Global Default Action....................................................................... 51-1
51.2 ACL CONFIGURATION TASK LIST ...................................................................................................... 51-2
51.3 ACL EXAMPLE .............................................................................................................................. 51-19
51.4 ACL TROUBLESHOOTING ............................................................................................................... 51-23
CHAPTER 52 802.1X CONFIGURATION ......................................................................52-1
52.1 INTRODUCTION TO 802.1X ................................................................................................................ 52-1
52.1.1 The Authentication Structure of 802.1x ............................................................................... 52-1
52.1.2 The Work Mechanism of 802.1x ......................................................................................... 52-3
52.1.3 The Encapsulation of EAPOL Messages ............................................................................ 52-3
52.1.4 The Encapsulation of EAP Attributes .................................................................................. 52-5
52.1.5 Web Authentication Proxy based on 802.1x ....................................................................... 52-5
52.1.6 The Extension and Optimization of 802.1x ....................................................................... 52-10
52.1.7 The Features of VLAN Allocation ...................................................................................... 52-11
52.2 802.1X CONFIGURATION TASK LIST ................................................................................................ 52-12
52.3 802.1X APPLICATION EXAMPLE ...................................................................................................... 52-15
52.3.1 Examples of Guest Vlan Applications ............................................................................... 52-15
52.3.2 Examples of IPv4 Radius Applications .............................................................................. 52-17