User Manual

Table Of Contents
15
CHAPTER 59 VLAN-ACL CONFIGURATION ...............................................................59-1
59.1 INTRODUCTION TO VLAN-ACL ........................................................................................................ 59-1
59.2 VLAN-ACL CONFIGURATION TASK LIST .......................................................................................... 59-1
59.3 VLAN-ACL CONFIGURATION EXAMPLE ............................................................................................ 59-3
59.4 VLAN-ACL TROUBLESHOOTING ...................................................................................................... 59-4
CHAPTER 60 MAB CONFIGURATION .........................................................................60-5
60.1 INTRODUCTION TO MAB ................................................................................................................... 60-5
60.2 MAB CONFIGURATION TASK LIST ..................................................................................................... 60-5
60.3 MAB EXAMPLE ............................................................................................................................... 60-7
60.4 MAB TROUBLESHOOTING ................................................................................................................ 60-9
CHAPTER 61 PPPOE INTERMEDIATE AGENT CONFIGURATION ..........................61-10
61.1 INTRODUCTION TO PPPOE INTERMEDIATE AGENT ........................................................................... 61-10
61.1.1 Brief Introduction to PPPoE .............................................................................................. 61-10
61.1.2 Introduction to PPPoE IA .................................................................................................. 61-10
61.2 PPPOE INTERMEDIATE AGENT CONFIGURATION TASK LIST ............................................................. 61-14
61.3 PPPOE INTERMEDIATE AGENT TYPICAL APPLICATION ..................................................................... 61-15
61.4 PPPOE INTERMEDIATE AGENT TROUBLESHOOTING ........................................................................ 61-16
CHAPTER 62 SAVI CONFIGURATION .......................................................................62-17
62.1 INTRODUCTION TO SAVI ................................................................................................................. 62-17
62.2 SAVI CONFIGURATION ................................................................................................................... 62-17
62.3 SAVI TYPICAL APPLICATION .......................................................................................................... 62-21
62.4 SAVI TROUBLESHOOTING .............................................................................................................. 62-22
CHAPTER 63 WEB PORTAL CONFIGURATION ........................................................63-23
63.1 INTRODUCTION TO WEB PORTAL AUTHENTICATION .......................................................................... 63-23
63.2 WEB PORTAL AUTHENTICATION CONFIGURATION TASK LIST ............................................................ 63-23
63.3 WEB PORTAL AUTHENTICATION TYPICAL EXAMPLE ......................................................................... 63-25
63.4 WEB PORTAL AUTHENTICATION TROUBLESHOOTING ....................................................................... 63-26
CHAPTER 64 VRRP CONFIGURATION ......................................................................64-27
64.1 INTRODUCTION TO VRRP ............................................................................................................... 64-27
64.2 VRRP CONFIGURATION TASK LIST ................................................................................................. 64-27
64.3 VRRP TYPICAL EXAMPLES ............................................................................................................ 64-29
64.4 VRRP TROUBLESHOOTING ............................................................................................................ 64-30
CHAPTER 65 IPV6 VRRPV3 CONFIGURATION...........................................................65-1