Contents 23How Does the Authentication Server AssignDiffServ Filters? . . . . . . . . . . . . . . . . . . . 489What is the Internal Authentication Server? . . . . 489Default 802.1X Values. . . . . . . . . . . . . . . . 490Configuring IEEE 802.1X (Web) . . . . . . . . . . . 491Configuring IEEE 802.1X (CLI) . . . . . . . . . . . . 498Configuring Internal Authentication ServerUsers . . . . . . . . . . . . . . . . . . . . . . . . 503IEEE 802.1X Configuration Examples . . . . . . . . 503Port Security (Port-MAC Locking) . . . . . . . . . . . . 517Default 802.1X Values. . . . . . . . . . . . . . . . 517Configuring Port Security (CLI) . . . . . . . . . . . 520Denial of Service . . . . . . . . . . . . . . . . . . . . 52120 Configuring Access Control Lists . . . . . 523ACL Overview . . . . . . . . . . . . . . . . . . . . . . 523What Are MAC ACLs? . . . . . . . . . . . . . . . 524What Are IP ACLs? . . . . . . . . . . . . . . . . . 525What Is the ACL Redirect Function? . . . . . . . . 525What Is the ACL Mirror Function? . . . . . . . . . 525What Is ACL Logging . . . . . . . . . . . . . . . . 526What Are Time-Based ACLs?. . . . . . . . . . . . 526What Are the ACL Limitations? . . . . . . . . . . . 527How Are ACLs Configured?. . . . . . . . . . . . . 528Preventing False ACL Matches. . . . . . . . . . . 528Configuring ACLs (Web) . . . . . . . . . . . . . . . . . 530IP ACL Configuration . . . . . . . . . . . . . . . . 530IP ACL Rule Configuration . . . . . . . . . . . . . 532MAC ACL Configuration . . . . . . . . . . . . . . 534MAC ACL Rule Configuration . . . . . . . . . . . . 536IPv6 ACL Configuration . . . . . . . . . . . . . . . 537