iTable of Contents1 MAC Address Authentication Configuration ··························································································1-1MAC Address Authentication Overview ··································································································1-1Performing MAC Address Authentication on a RADIUS Server ·····················································1-1Performing MAC Address Authentication Locally ···········································································1-1Related Concepts····································································································································1-2MAC Address Authentication Timers ······························································································1-2Quiet MAC Address·························································································································1-2Configuring Basic MAC Address Authentication Functions ····································································1-2MAC Address Authentication Enhanced Function Configuration ···························································1-4MAC Address Authentication Enhanced Function Configuration Task List ····································1-4Configuring a Guest VLAN ··············································································································1-4Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port·························································································································································1-6Displaying and Maintaining MAC Address Authentication Configuration ···············································1-7MAC Address Authentication Configuration Examples···········································································1-7