SNR S2940-8G-v2 Switch Configuration Guide
CONTENTS
IX Security Function Configuration 278
43 ACL Configuration 279
43.1IntroductiontoACL.................................... 279
43.2 ACL Configuration Task List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
43.3ACLExample....................................... 294
43.4ACLTroubleshooting................................... 297
44 Self-defined ACL Configuration 299
44.1 Introduction to Self-defined ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
44.2 Self-defined ACL Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
44.3 Self-defined ACL Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
45 802.1x Configuration 305
45.1Introductionto802.1x .................................. 305
45.2 802.1x Configuration Task List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
45.3 802.1x Application Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
45.4802.1xTroubleshooting ................................. 323
46 The Number Limitation Function of MAC and IP in Port, VLAN Configuration 324
46.1 Introduction to the Number Limitation Function of MAC and IP in Port, VLAN . . . 324
46.2 The Number Limitation Function of MAC and IP in Port, VLAN Configuration Task
Sequence......................................... 325
46.3 The Number Limitation Function of MAC and IP in Port, VLAN Typical Examples . 327
46.4 The Number Limitation Function of MAC and IP in Port, VLAN Troubleshooting Help 328
47 Operational Configuration of AM Function 329
47.1 Introduction to AM Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
47.2 AM Function Configuration Task List . . . . . . . . . . . . . . . . . . . . . . . . . . 329
47.3AMFunctionExample .................................. 331
47.4 AM Function Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
48 Security Feature Configuration 332
48.1 Introduction to Security Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
48.2 Security Feature Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
48.3 Security Feature Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
49 TACACS+ Configuration 335
49.1 Introduction to TACACS+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
49.2 TACACS+ Configuration Task List . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
49.3 TACACS+ Scenarios Typical Examples . . . . . . . . . . . . . . . . . . . . . . . . 336
49.4 TACACS+ Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
50 RADIUS Configuration 338
50.1IntroductiontoRADIUS ................................. 338
50.2 RADIUS Configuration Task List . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
50.3 RADIUS Typical Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
50.4 RADIUS Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
7