iTable of Contents1 MAC Authentication Configuration··········································································································1-1MAC Authentication Overview ················································································································1-1Performing MAC Authentication on a RADIUS Server····································································1-1Performing MAC Authentication Locally··························································································1-1Related Concepts····································································································································1-2MAC Authentication Timers·············································································································1-2Quiet MAC Address·························································································································1-2Configuring Basic MAC Authentication Functions ··················································································1-2MAC Address Authentication Enhanced Function Configuration ···························································1-4MAC Address Authentication Enhanced Function Configuration Tasks ·········································1-4Configuring a Guest VLAN or Auth-Fail VLAN················································································1-4Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port·························································································································································1-6Configuring the Quiet MAC Function on a Port···············································································1-7Displaying and Debugging MAC Authentication ·····················································································1-7MAC Authentication Configuration Example···························································································1-8