v
MAC authentication configuration examples ············································································································ 101
Local MAC authentication configuration example ·························································································· 101
RADIUS-based MAC authentication configuration example ·········································································· 103
ACL assignment configuration example ··········································································································· 105
Portal configuration ···················································································································································· 108
Portal overview ····························································································································································· 108
Introduction to portal ··········································································································································· 108
Extended portal functions ··································································································································· 108
Portal system components ··································································································································· 108
Portal system using the local portal server ········································································································ 110
Portal authentication modes ······························································································································· 111
Layer 2 portal authentication process ··············································································································· 111
Portal configuration task list ········································································································································ 112
Configuration prerequisites ········································································································································· 113
Specifying the local portal server for Layer 2 portal authentication ······························································ 114
Configuring the local portal server ···························································································································· 114
Customizing authentication pages ···················································································································· 114
Configuring the local portal server ···················································································································· 117
Enabling Layer 2 portal authentication ······················································································································ 118
Controlling access of portal users ······························································································································ 119
Configuring a portal-free rule ···························································································································· 119
Setting the maximum number of online portal users ························································································ 119
Specifying an authentication domain for portal users ····················································································· 120
Adding a web proxy server port number ········································································································· 120
Enabling support for portal user moving ·········································································································· 121
Specifying the Auth-Fail VLAN for portal authentication ························································································· 122
Specifying the auto redirection URL for authenticated portal users ········································································ 122
Configuring portal detection functions ······················································································································· 123
Logging off portal users ··············································································································································· 123
Displaying and maintaining portal ···························································································································· 123
Portal configuration examples ···································································································································· 124
Configuring Layer 2 portal authentication ········································································································ 124
Troubleshooting portal ················································································································································· 128
Inconsistent keys on the access device and the portal server ········································································· 128
Incorrect server port number on the access device ························································································· 128
Triple authentication configuration ··························································································································· 130
Triple authentication overview ···································································································································· 130
Triple authentication mechanism ······················································································································· 130
Using triple authentication with other features ································································································· 131
Configuring triple authentication ································································································································ 131
Triple authentication configuration examples ··········································································································· 132
Triple authentication basic function configuration example ··········································································· 132
Triple authentication supporting VLAN assignment and Auth-Fail VLAN configuration example ·············· 135
Port security configuration·········································································································································· 140
Port security overview ·················································································································································· 140
Port security features ··········································································································································· 140
Port security modes ············································································································································· 140
Support for guest VLAN and Auth-Fail VLAN ··································································································· 143
Port security configuration task list ····························································································································· 143
Enabling port security ·················································································································································· 144
Configuration prerequisites ································································································································ 144
Configuration procedure ···································································································································· 144
Setting the maximum number of secure MAC addresses ························································································ 144