MAC Authentication Overview ················································································································1-1
Local MAC Authentication ···············································································································1-1
Related Concepts····································································································································1-2
MAC Authentication Timers·············································································································1-2
Quiet MAC Address·························································································································1-2
VLAN Assigning·······························································································································1-2
ACL Assigning ·································································································································1-2
Configuration Prerequisites ·············································································································1-3
Configuration Procedure··················································································································1-3
Configuring a Guest VLAN······················································································································1-4
Configuration Prerequisites ·············································································································1-4
Configuration Procedure··················································································································1-4
Table of Contents
i