Chapter 50 multicast vlan -1, Chapter 51 acl configuration -1 – PLANET XGS3-24042 User Manual

Page 15

Advertising
background image

13

49.6.2 MLD Configuration Task List ............................................................................................. 49-25

49.6.3 MLD Typical Application .................................................................................................... 49-26

49.6.4 MLD Troubleshooting Help................................................................................................ 49-27

49.7

MLD

S

NOOPING

............................................................................................................................ 49-27

49.7.1 Introduction to MLD Snooping........................................................................................... 49-27

49.7.2 MLD Snooping Configuration Task.................................................................................... 49-28

49.7.3 MLD Snooping Examples .................................................................................................. 49-29

49.7.4 MLD Snooping Troubleshooting ........................................................................................ 49-32

CHAPTER 50 MULTICAST VLAN .................................................................................50-1

50.1

I

NTRODUCTIONS TO

M

ULTICAST

VLAN ............................................................................................. 50-1

50.2

M

ULTICAST

VLAN

C

ONFIGURATION

T

ASK

L

IST

................................................................................. 50-1

50.3

M

ULTICAST

VLAN

E

XAMPLES

.......................................................................................................... 50-2

CHAPTER 51 ACL CONFIGURATION ..........................................................................51-1

51.1

I

NTRODUCTION TO

ACL.................................................................................................................... 51-1

51.1.1 Access-list ........................................................................................................................... 51-1

51.1.2 Access-group ...................................................................................................................... 51-1

51.1.3 Access-list Action and Global Default Action....................................................................... 51-1

51.2

ACL

C

ONFIGURATION

T

ASK

L

IST

...................................................................................................... 51-2

51.3

ACL

E

XAMPLE

.............................................................................................................................. 51-18

51.4

ACL

T

ROUBLESHOOTING

............................................................................................................... 51-22

CHAPTER 52 802.1X CONFIGURATION ......................................................................52-1

52.1

I

NTRODUCTION TO

802.1

X

................................................................................................................ 52-1

52.1.1 The Authentication Structure of 802.1x ............................................................................... 52-1

52.1.2 The Work Mechanism of 802.1x ......................................................................................... 52-3

52.1.3 The Encapsulation of EAPOL Messages ............................................................................ 52-3

52.1.4 The Encapsulation of EAP Attributes .................................................................................. 52-5

52.1.5 Web Authentication Proxy based on 802.1x ....................................................................... 52-5

52.1.6 The Extension and Optimization of 802.1x ....................................................................... 52-10

52.1.7 The Features of VLAN Allocation ...................................................................................... 52-11

52.2

802.1

X

C

ONFIGURATION

T

ASK

L

IST

................................................................................................ 52-12

52.3

802.1

X

A

PPLICATION

E

XAMPLE

...................................................................................................... 52-14

52.3.1 Examples of Guest Vlan Applications ............................................................................... 52-14

52.3.2 Examples of IPv4 Radius Applications .............................................................................. 52-17

52.3.3 Examples of IPv6 Radius Application ............................................................................... 52-18

52.4

802.1

X

T

ROUBLESHOOTING

........................................................................................................... 52-19

CHAPTER 53 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN AND IP
CONFIGURATION ..........................................................................................................53-1

53.1

I

NTRODUCTION TO THE

N

UMBER

L

IMITATION

F

UNCTION OF

P

ORT

,

MAC

IN

VLAN

AND

IP .................... 53-1

Advertising
This manual is related to the following products: