Chapter 45 multicast vlan -1, Chapter 46 acl configuration -1 – PLANET XGS3-24040 User Manual

Page 14

Advertising
background image

12

44.7.3 MLD Snooping Examples

.................................................................................................. 44-30

44.7.4 MLD Snooping Troubleshooting

........................................................................................ 44-33

CHAPTER 45 MULTICAST VLAN

.................................................................................45-1

45.1

I

NTRODUCTIONS TO

M

ULTICAST

VLAN

............................................................................................. 45-1

45.2

M

ULTICAST

VLAN

C

ONFIGURATION

T

ASK

L

IST

................................................................................. 45-1

45.3

M

ULTICAST

VLAN

E

XAMPLES

.......................................................................................................... 45-2

CHAPTER 46 ACL CONFIGURATION

..........................................................................46-1

46.1

I

NTRODUCTION TO

ACL

.................................................................................................................... 46-1

46.1.1 Access-list

........................................................................................................................... 46-1

46.1.2 Access-group

...................................................................................................................... 46-1

46.1.3 Access-list Action and Global Default Action

....................................................................... 46-1

46.2

ACL

C

ONFIGURATION

T

ASK

L

IST

...................................................................................................... 46-2

46.3

ACL

E

XAMPLE

.............................................................................................................................. 46-17

46.4

ACL

T

ROUBLESHOOTING

............................................................................................................... 46-21

CHAPTER 47 802.1X CONFIGURATION

......................................................................47-1

47.1

I

NTRODUCTION TO

802.1

X

................................................................................................................ 47-1

47.1.1 The Authentication Structure of 802.1x

............................................................................... 47-1

47.1.2 The Work Mechanism of 802.1x

......................................................................................... 47-3

47.1.3 The Encapsulation of EAPOL Messages

............................................................................ 47-3

47.1.4 The Encapsulation of EAP Attributes

.................................................................................. 47-5

47.1.5 Web Authentication Proxy based on 802.1x

....................................................................... 47-5

47.1.6 The Authentication Methods of 802.1x

................................................................................ 47-6

47.1.7 The Extension and Optimization of 802.1x

....................................................................... 47-11

47.1.8 The Features of VLAN Allocation

...................................................................................... 47-12

47.2

802.1

X

C

ONFIGURATION

T

ASK

L

IST

................................................................................................ 47-13

47.3

802.1

X

A

PPLICATION

E

XAMPLE

...................................................................................................... 47-16

47.3.1 Examples of Guest Vlan Applications

............................................................................... 47-16

47.3.2 Examples of IPv4 Radius Applications

.............................................................................. 47-19

47.3.3 Examples of IPv6 Radius Application

............................................................................... 47-20

47.3.4 802.1x Web Proxy Authentication Sample Application

..................................................... 47-21

47.4

802.1

X

T

ROUBLESHOOTING

........................................................................................................... 47-22

CHAPTER 48 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN AND IP
CONFIGURATION

..........................................................................................................48-1

48.1

I

NTRODUCTION TO THE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

AND

IP

.................... 48-1

48.2

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

AND

IP

C

ONFIGURATION

T

ASK

S

EQUENCE

............................................................................................................................................................... 48-2

48.3

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

AND

IP

T

YPICAL

E

XAMPLES

................. 48-4

48.4

T

HE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

AND

IP

T

ROUBLESHOOTING

H

ELP

........ 48-5

Advertising