RADIUS-Based MAC Authentication·······························································································5-1
Local MAC Authentication ···············································································································5-1
Configuration Prerequisites ·············································································································5-2
Configuration Procedure··················································································································5-3
Port Security Overview ····················································································································6-1
Configuration Prerequisites ·············································································································6-5
Configuration Procedure··················································································································6-5
Configuration Prerequisites ·············································································································6-6
Configuring Procedure·····················································································································6-7
Configuring NTK ······························································································································6-7
Configuration Prerequisites ·············································································································6-9
Configuration Procedure··················································································································6-9
iii