Chapter 43 security feature configuration, Chapter 44 tacacs+ configuration – QTECH QSW-3400 Инструкция по настройке User Manual

Page 11

Advertising
background image

+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1

10

40.1

I

NTRODUCTION TO

802.1

X

.......................................................................................... 319

40.1.1 The Authentication Structure of 802.1x .................................................... 319

40.1.2 The Work Mechanism of 802.1x................................................................. 321

40.1.3 The Encapsulation of EAPOL Messages .................................................. 322

40.1.4 The Encapsulation of EAP Attributes ....................................................... 324

40.1.5 The Authentication Methods of 802.1x ..................................................... 324

40.1.6 The Extension and Optimization of 802.1x ............................................... 329

40.1.7 The Features of VLAN Allocation .............................................................. 330

40.2

802.1

X

C

ONFIGURATION

T

ASK

L

IST

............................................................................ 331

40.3

802.1

X

A

PPLICATION

E

XAMPLE

.................................................................................. 334

40.3.1 Examples of Guest Vlan Applications ...................................................... 334

40.3.2 Examples of IPv4 Radius Applications ..................................................... 337

40.3.3 Examples of IPv6 Radius Application ....................................................... 338

40.4

802.1

X

T

ROUBLESHOOTING

....................................................................................... 339

CHAPTER 41 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN
PORT, VLAN CONFIGURATION ..................................................................... 340

41.1

I

NTRODUCTION TO THE

N

UMBER

L

IMITATION

F

UNCTION OF

MAC

AND

IP

IN

P

ORT

,

VLAN 340

41.2

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

MAC

AND

IP

IN

P

ORT

,

VLAN

C

ONFIGURATION

T

ASK

S

EQUENCE

....................................................................................................................... 341

41.3

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

MAC

AND

IP

IN

P

ORT

,

VLAN

T

YPICAL

E

XAMPLES

........................................................................................................................................ 343

41.4

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

MAC

AND

IP

IN

P

ORT

,

VLAN

T

ROUBLESHOOTING

H

ELP

............................................................................................................................... 344

CHAPTER 42 OPERATIONAL CONFIGURATION OF AM FUNCTION .......... 345

42.1

I

NTRODUCTION TO

AM

F

UNCTION

............................................................................... 345

42.2

AM

F

UNCTION

C

ONFIGURATION

T

ASK

L

IST

................................................................. 345

42.3

AM

F

UNCTION

E

XAMPLE

............................................................................................ 347

42.4

AM

F

UNCTION

T

ROUBLESHOOTING

............................................................................ 347

CHAPTER 43 SECURITY FEATURE CONFIGURATION ............................... 348

43.1

I

NTRODUCTION TO

S

ECURITY

F

EATURE

....................................................................... 348

43.2

S

ECURITY

F

EATURE

C

ONFIGURATION

.......................................................................... 348

43.2.1 Prevent IP Spoofing Function Configuration Task Sequence ................ 348

43.2.2 Prevent ICMP Fragment Attack Function Configuration Task Sequence

................................................................................................................................ 348

CHAPTER 44 TACACS+ CONFIGURATION .................................................. 350

Advertising