Chapter 24 acl configuration -4 – PLANET WGSW-50040 User Manual

Page 8

Advertising
background image

6

23.1

I

NTRODUCTIONS TO

M

ULTICAST

VLAN

............................................................................................. 23-1

23.2

M

ULTICAST

VLAN

C

ONFIGURATION

T

ASK

L

IST

................................................................................. 23-1

23.3

M

ULTICAST

VLAN

E

XAMPLES

.......................................................................................................... 23-2

CHAPTER 24 ACL CONFIGURATION

..........................................................................24-4

24.1

I

NTRODUCTION TO

ACL

.................................................................................................................... 24-4

24.1.1 Access-list

........................................................................................................................... 24-4

24.1.2 Access-group

...................................................................................................................... 24-4

24.1.3 Access-list Action and Global Default Action

....................................................................... 24-4

24.2

ACL

C

ONFIGURATION

T

ASK

L

IST

...................................................................................................... 24-5

24.3

ACL

E

XAMPLE

.............................................................................................................................. 24-18

24.4

ACL

T

ROUBLESHOOTING

............................................................................................................... 24-22

CHAPTER 25 802.1X CONFIGURATION

......................................................................25-1

25.1

I

NTRODUCTION TO

802.1

X

................................................................................................................ 25-1

25.1.1 The Authentication Structure of 802.1x

............................................................................... 25-1

25.1.2 The Work Mechanism of 802.1x

......................................................................................... 25-3

25.1.3 The Encapsulation of EAPOL Messages

............................................................................ 25-3

25.1.4 The Encapsulation of EAP Attributes

.................................................................................. 25-5

25.1.5 Web Authentication Proxy based on 802.1x

....................................................................... 25-5

25.1.6 The Authentication Methods of 802.1x

................................................................................ 25-6

25.1.7 The Extension and Optimization of 802.1x

....................................................................... 25-11

25.1.8 The Features of VLAN Allocation

...................................................................................... 25-12

25.2

802.1

X

C

ONFIGURATION

T

ASK

L

IST

................................................................................................ 25-13

25.3

802.1

X

A

PPLICATION

E

XAMPLE

...................................................................................................... 25-16

25.3.1 Examples of Guest Vlan Applications

............................................................................... 25-16

25.3.2 Examples of IPv4 Radius Applications

.............................................................................. 25-19

25.3.3 Examples of IPv6 Radius Application

............................................................................... 25-20

25.3.4 802.1x Web Proxy Authentication Sample Application

..................................................... 25-21

25.4

802.1

X

T

ROUBLESHOOTING

........................................................................................................... 25-22

CHAPTER 26 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN
CONFIGURATION

..........................................................................................................26-1

26.1

I

NTRODUCTION TO THE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

............................... 26-1

26.2

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

C

ONFIGURATION

T

ASK

S

EQUENCE

....... 26-1

26.3

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

T

YPICAL

E

XAMPLES

............................ 26-3

26.4

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

T

ROUBLESHOOTING

H

ELP

................... 26-3

CHAPTER 27 OPERATIONAL CONFIGURATION OF AM FUNCTION

........................27-1

27.1

I

NTRODUCTION TO

AM

F

UNCTION

..................................................................................................... 27-1

27.2

AM

F

UNCTION

C

ONFIGURATION

T

ASK

L

IST

....................................................................................... 27-1

Advertising