User's Manual

Table Of Contents
Configuration Guide of XGS-5240-Series
13
CHAPTER 45 ACL CONFIGURATION .......................................................................... 45-5
45.1 INTRODUCTION TO ACL .................................................................................................................... 45-5
45.1.1 Access-list ............................................................................................................................ 45-5
45.1.2 Access-group ....................................................................................................................... 45-5
45.1.3 Access-list Action and Global Default Action ....................................................................... 45-6
45.2 ACL CONFIGURATION TASK LIST ...................................................................................................... 45-6
45.3 ACL EXAMPLE ............................................................................................................................... 45-22
45.4 ACL TROUBLESHOOTING ............................................................................................................... 45-26
CHAPTER 46 SELF-DEFINED ACL CONFIGURATION ............................................... 46-1
46.1 INTRODUCTION TO SELF-DEFINED ACL ............................................................................................. 46-1
46.1.1 Standard Self-defined ACL Template .................................................................................. 46-1
46.1.2 Digital Self-defined ACL ....................................................................................................... 46-2
46.2 SELF-DEFINED ACL CONFIGURATION ................................................................................................ 46-2
46.3 SELF-DEFINED ACL EXAMPLE .......................................................................................................... 46-3
46.4 SELF-DEFINED ACL TROUBLESHOOTING ........................................................................................... 46-4
CHAPTER 47 802.1X CONFIGURATION ..................................................................... 47-1
47.1 INTRODUCTION TO 802.1X ................................................................................................................ 47-1
47.1.1 The Authentication Structure of 802.1x ............................................................................... 47-1
47.1.2 The Work Mechanism of 802.1x .......................................................................................... 47-3
47.1.3 The Encapsulation of EAPOL Messages ............................................................................ 47-4
47.1.4 The Encapsulation of EAP Attributes ................................................................................... 47-6
47.1.5 The Authentication Methods of 802.1x ................................................................................ 47-7
47.1.6 The Extension and Optimization of 802.1x ........................................................................ 47-12
47.1.7 The Features of VLAN Allocation ...................................................................................... 47-13
47.2 802.1X CONFIGURATION TASK LIST ................................................................................................ 47-14
47.3 802.1X APPLICATION EXAMPLE ...................................................................................................... 47-17
47.3.1 Examples of Guest Vlan Applications ................................................................................ 47-17
47.3.2 Examples of IPv4 Radius Applications .............................................................................. 47-20
47.3.3 Examples of IPv6 Radius Application ................................................................................ 47-21
47.4 802.1X TROUBLESHOOTING............................................................................................................ 47-22
CHAPTER 48 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT,
VLAN CONFIGURATION ............................................................................................... 48-1
48.1 INTRODUCTION TO THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN .................... 48-1
48.2 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN CONFIGURATION TASK
SEQUENCE .............................................................................................................................................. 48-2