i
Table of Contents
1 MAC Authentication Configuration··········································································································1-1
MAC Authentication Overview ················································································································1-1
Performing MAC Authentication on a RADIUS Server····································································1-1
Performing MAC Authentication Locally··························································································1-1
Related Concepts····································································································································1-2
MAC Authentication Timers·············································································································1-2
Quiet MAC Address·························································································································1-2
Configuring Basic MAC Authentication Functions ··················································································1-2
MAC Address Authentication Enhanced Function Configuration ···························································1-4
MAC Address Authentication Enhanced Function Configuration Tasks·········································1-4
Configuring a Guest VLAN ··············································································································1-4
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a
Port··················································································································································
1-6
Displaying and Maintaining MAC Authentication ····················································································1-7
MAC Authentication Configuration Example···························································································1-7