Configuration Guide Vol. 2
This chapter provides an overview of Layer 2 authentication in the Switch.
5.1 Overview
5.2 Coexistence of Layer 2 authentication and other functions
5.3 Functionality common to Layer 2 authentication
5.4 Notes on using Layer 2 authentication
5.5 Command guide common to Layer 2 authentication