MAC Authentication Overview ················································································································1-1
Local MAC Authentication ···············································································································1-1
Related Concepts····································································································································1-2
MAC Authentication Timers·············································································································1-2
Quiet MAC Address·························································································································1-2
VLAN Assigning·······························································································································1-2
ACL Assigning ·································································································································1-2
Configuration Prerequisites ·············································································································1-2
Configuration Procedure··················································································································1-3
Table of Contents
i