PLANET WGSW-52040 User Manual

Page 12

Advertising
background image

42.1.1 The Authentication Structure of 802.1x ........................................................................... 42-135

42.1.2 The Work Mechanism of 802.1x ..................................................................................... 42-137

42.1.3 The Encapsulation of EAPOL Messages ........................................................................ 42-138

42.1.4 The Encapsulation of EAP Attributes .............................................................................. 42-140

42.1.5 The Authentication Methods of 802.1x............................................................................ 42-141

42.1.6 The Extension and Optimization of 802.1x ..................................................................... 42-146

42.1.7 The Features of VLAN Allocation.................................................................................... 42-147

42.2

802.1

X

C

ONFIGURATION

T

ASK

L

IST

.............................................................................................. 42-148

42.3

802.1

X

A

PPLICATION

E

XAMPLE

.................................................................................................... 42-152

42.3.1 Examples of Guest Vlan Applications ............................................................................. 42-152

42.3.2 Examples of IPv4 Radius Applications............................................................................ 42-155

42.3.3 Examples of IPv6 Radius Application ............................................................................. 42-156

42.4

802.1

X

T

ROUBLESHOOTING

......................................................................................................... 42-157

CHAPTER 43 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN
CONFIGURATION......................................................................................................43-158

43.1

I

NTRODUCTION TO THE

N

UMBER

L

IMITATION

F

UNCTION OF

MAC

AND

IP

IN

P

ORT

,

VLAN ................ 43-158

43.2

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

MAC

AND

IP

IN

P

ORT

,

VLAN

C

ONFIGURATION

T

ASK

S

EQUENCE

........................................................................................................................................................... 43-159

43.3

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

MAC

AND

IP

IN

P

ORT

,

VLAN

T

YPICAL

E

XAMPLES

............. 43-162

43.4

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

MAC

AND

IP

IN

P

ORT

,

VLAN

T

ROUBLESHOOTING

H

ELP

.... 43-163

CHAPTER 44 OPERATIONAL CONFIGURATION OF AM FUNCTION ....................44-164

44.1

I

NTRODUCTION TO

AM

F

UNCTION

................................................................................................. 44-164

44.2

AM

F

UNCTION

C

ONFIGURATION

T

ASK

L

IST

................................................................................... 44-164

44.3

AM

F

UNCTION

E

XAMPLE

.............................................................................................................. 44-166

44.4

AM

F

UNCTION

T

ROUBLESHOOTING

.............................................................................................. 44-167

CHAPTER 45 SECURITY FEATURE CONFIGURATION ..........................................45-168

45.1

I

NTRODUCTION TO

S

ECURITY

F

EATURE

......................................................................................... 45-168

45.2

S

ECURITY

F

EATURE

C

ONFIGURATION

........................................................................................... 45-168

45.2.1 Prevent IP Spoofing Function Configuration Task Sequence ......................................... 45-168

45.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence ......... 45-169

45.2.3 Anti Port Cheat Function Configuration Task Sequence................................................. 45-169

45.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence ......................... 45-169

45.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence ....................... 45-170

45.3

S

ECURITY

F

EATURE

E

XAMPLE

...................................................................................................... 45-170

CHAPTER 46 TACACS+ CONFIGURATION.............................................................46-171

46.1

I

NTRODUCTION TO

TACACS+...................................................................................................... 46-171

46.2

TACACS+

C

ONFIGURATION

T

ASK

L

IST

........................................................................................ 46-171

10

Advertising