SGS-6341-Series User Manual

Table Of Contents
40.3 MULTICAST VLAN EXAMPLES........................................................................................................ 40-46
CHAPTER 41 ACL CONFIGURATION ........................................................................41-49
41.1 INTRODUCTION TO ACL.................................................................................................................. 41-49
41.1.1 Access-list ......................................................................................................................... 41-49
41.1.2 Access-group .................................................................................................................... 41-49
41.1.3 Access-list Action and Global Default Action..................................................................... 41-50
41.2 ACL CONFIGURATION TASK LIST.................................................................................................... 41-50
41.3 ACL EXAMPLE .............................................................................................................................. 41-64
41.4 ACL TROUBLESHOOTING ............................................................................................................... 41-69
CHAPTER 42 802.1X CONFIGURATION ....................................................................42-71
42.1 INTRODUCTION TO 802.1X .............................................................................................................. 42-71
42.1.1 The Authentication Structure of 802.1x ............................................................................. 42-71
42.1.2 The Work Mechanism of 802.1x ....................................................................................... 42-73
42.1.3 The Encapsulation of EAPOL Messages .......................................................................... 42-74
42.1.4 The Encapsulation of EAP Attributes ................................................................................ 42-75
42.1.5 The Authentication Methods of 802.1x.............................................................................. 42-77
42.1.6 The Extension and Optimization of 802.1x ....................................................................... 42-81
42.1.7 The Features of VLAN Allocation ...................................................................................... 42-82
42.2 802.1X CONFIGURATION TASK LIST ................................................................................................ 42-83
42.3 802.1X APPLICATION EXAMPLE...................................................................................................... 42-87
42.3.1 Examples of Guest VLAN Applications ............................................................................. 42-87
42.3.2 Examples of IPv4 RADIUS Applications ........................................................................... 42-90
42.3.3 Examples of IPv6 RADIUS Application ............................................................................. 42-91
42.4 802.1X TROUBLESHOOTING ........................................................................................................... 42-92
CHAPTER 43 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN
CONFIGURATION........................................................................................................43-93
43.1 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN CONFIGURATION TASK SEQUENCE
............................................................................................................................................................. 43-94
43.2 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN TYPICAL EXAMPLES............... 43-97
43.3 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN TROUBLESHOOTING HELP...... 43-98
CHAPTER 44 OPERATIONAL CONFIGURATION OF AM FUNCTION ......................44-99
44.1 INTRODUCTION TO AM FUNCTION ................................................................................................... 44-99
44.2 AM FUNCTION CONFIGURATION TASK LIST ..................................................................................... 44-99
44.3 AM FUNCTION EXAMPLE.............................................................................................................. 44-101
44.4 AM FUNCTION TROUBLESHOOTING .............................................................................................. 44-102
CHAPTER 45 SECURITY FEATURE CONFIGURATION..........................................45-103
45.1 INTRODUCTION TO SECURITY FEATURE ......................................................................................... 45-103
10