<
Home
Configuration Examples for NAC
Overview of Configuration Examples
Example for Configuring MAC Address Authentication (AAA RADIUS Authentication Is Used)
Example for Configuring MAC Address Authentication (AAA Local Authentication Is Used)
Example for Configuring MAC Address Authentication with Double VLAN Tags in the L2 BNG Scenario (AAA RADIUS Authentication Is Used)
Example for Configuring 802.1X Authentication (Authentication Point on the Access Switch)
Example for Configuring 802.1X Authentication (Authentication Point on the Aggregation Switch)
Example for Configuring 802.1X Authentication for Windows Clients (RADIUS Server and AD Server Are Used)
Example for Configuring 802.1X Authentication Escape (Used When Both the Active and Standby RADIUS Servers Are Faulty)
Example for Configuring External Portal Authentication (Using the Portal Protocol)
Example for Configuring External IPv6 Portal Authentication (Using the Portal Protocol)
Example for Configuring External Portal Authentication (Using the HTTPS Protocol)
Example for Configuring Built-in Portal Authentication
Example for Configuring Portal Authentication Escape (Used When Both the Active and Standby Servers Are Faulty)
Example for Configuring WeChat Authentication in a Wireless-to-Wired Scenario
Example for Configuring MAC Address-Prioritized Portal Authentication in a Wireless-to-Wired Scenario
Example for Configuring Terminal Type Identification in 802.1X + RADIUS Authentication
Example for Configuring MAC Address Migration
Example for Connecting IP Phones to Switches Through MAC Address Authentication Triggered by LLDP or CDP Packets
Example for Configuring MAC Address Authentication for IP Phones and 802.1X Authentication for PCs Connected to IP Phones
Example for Configuring Non-authentication for IP Phones and 802.1X Authentication for PCs Connected to IP Phones
Example for Configuring 802.1X and MAC Address Authentication to Control Internal User Access to the Enterprise Network (with Unauthenticated AP)
Example for Configuring Multi-mode Authentication for Wired and Wireless Users