Manual
+7(495) 797-3311 www.qtech.ru 
Москва, Новозаводская ул., 18, стр. 1 
10 
40.1 INTRODUCTION TO 802.1X .......................................................................................... 319 
40.1.1 The Authentication Structure of 802.1x .................................................... 319 
40.1.2 The Work Mechanism of 802.1x................................................................. 321 
40.1.3 The Encapsulation of EAPOL Messages .................................................. 322 
40.1.4 The Encapsulation of EAP Attributes ....................................................... 324 
40.1.5 The Authentication Methods of 802.1x ..................................................... 324 
40.1.6 The Extension and Optimization of 802.1x ............................................... 329 
40.1.7 The Features of VLAN Allocation .............................................................. 330 
40.2 802.1X CONFIGURATION TASK LIST ............................................................................ 331 
40.3 802.1X APPLICATION EXAMPLE .................................................................................. 334 
40.3.1 Examples of Guest Vlan Applications ...................................................... 334 
40.3.2 Examples of IPv4 Radius Applications ..................................................... 337 
40.3.3 Examples of IPv6 Radius Application ....................................................... 338 
40.4 802.1X TROUBLESHOOTING ....................................................................................... 339 
CHAPTER  41  THE  NUMBER  LIMITATION  FUNCTION  OF  MAC AND  IP  IN 
PORT, VLAN CONFIGURATION ..................................................................... 340 
41.1 INTRODUCTION TO THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN 340 
41.2 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN CONFIGURATION TASK 
SEQUENCE ....................................................................................................................... 341 
41.3 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN TYPICAL EXAMPLES
........................................................................................................................................ 343 
41.4 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN TROUBLESHOOTING 
HELP ............................................................................................................................... 344 
CHAPTER 42 OPERATIONAL CONFIGURATION OF AM FUNCTION .......... 345 
42.1 INTRODUCTION TO AM FUNCTION ............................................................................... 345 
42.2 AM FUNCTION CONFIGURATION TASK LIST ................................................................. 345 
42.3 AM FUNCTION EXAMPLE............................................................................................ 347 
42.4 AM FUNCTION TROUBLESHOOTING ............................................................................ 347 
CHAPTER 43 SECURITY FEATURE CONFIGURATION ............................... 348 
43.1 INTRODUCTION TO SECURITY FEATURE ....................................................................... 348 
43.2 SECURITY FEATURE CONFIGURATION .......................................................................... 348 
43.2.1 Prevent IP Spoofing Function Configuration Task Sequence ................ 348 
43.2.2  Prevent  ICMP  Fragment  Attack  Function  Configuration  Task  Sequence
 ................................................................................................................................ 348 
CHAPTER 44 TACACS+ CONFIGURATION .................................................. 350 










