Displaying and Maintaining HWTACACS Protocol Configuration............................................... 33-29
AAA Configuration Examples.............................................................................................................. 33-29
Remote RADIUS Authentication of Telnet/SSH Users ............................................................... 33-29
Local Authentication of FTP/Telnet Users................................................................................... 33-31
HWTACACS Authentication and Authorization of Telnet Users ................................................. 33-32
Auto VLAN Configuration Example ............................................................................................. 33-33
Troubleshooting AAA .......................................................................................................................... 33-34
Troubleshooting RADIUS Configuration...................................................................................... 33-34
Troubleshooting HWTACACS Configuration .............................................................................. 33-35
34
EAD Configuration ................................................................................................................................. 34-1
Introduction to EAD ............................................................................................................................... 34-1
Typical Network Application of EAD ..................................................................................................... 34-1
EAD Configuration ................................................................................................................................ 34-1
EAD Configuration Example ................................................................................................................. 34-2
35
MAC Address Authentication Configuration ...................................................................................... 35-1
MAC Address Authentication Overview ................................................................................................ 35-1
Performing MAC Address Authentication on a RADIUS Server ................................................... 35-1
Performing MAC Address Authentication Locally ......................................................................... 35-1
Related Concepts.................................................................................................................................. 35-2
MAC Address Authentication Timers ............................................................................................ 35-2
Quiet MAC Address....................................................................................................................... 35-2
Configuring Basic MAC Address Authentication Functions .................................................................. 35-2
MAC Address Authentication Enhanced Function Configuration ......................................................... 35-4
MAC Address Authentication Enhanced Function Configuration Task List .................................. 35-4
Configuring a Guest VLAN ............................................................................................................ 35-4
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port ......... 35-6
Displaying and Maintaining MAC Address Authentication Configuration ............................................. 35-7
MAC Address Authentication Configuration Examples......................................................................... 35-7
36
ARP Configuration ................................................................................................................................. 36-1
Introduction to ARP ............................................................................................................................... 36-1
ARP Function ................................................................................................................................ 36-1
ARP Message Format ................................................................................................................... 36-1
ARP Table ..................................................................................................................................... 36-3
ARP Process ................................................................................................................................. 36-3
Introduction to Gratuitous ARP...................................................................................................... 36-4
Configuring ARP ................................................................................................................................... 36-4
Configuring Gratuitous ARP.................................................................................................................. 36-5
Displaying and Debugging ARP............................................................................................................ 36-6
ARP Configuration Examples ............................................................................................................... 36-6
37
ARP Attack Defense Configuration...................................................................................................... 37-1
ARP Attack Defense Configuration....................................................................................................... 37-1
Introduction to Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn........... 37-1
Introduction to ARP Source MAC Address Consistency Check.................................................... 37-1
Introduction to ARP Attack Detection ............................................................................................ 37-1
Introduction to ARP Packet Rate Limit .......................................................................................... 37-3
Introduction to ARP Packet Filtering Based on Gateway's Address ............................................. 37-3
Configuring ARP Attack Defense.......................................................................................................... 37-4
xii