Configuration Guide Vol. 2
10.3.1 Operation after authentication failure
10.3.2 Forced authentication
10.3.3 Deauthorization method
10.3.4 Limiting the number of authentications
10.3.5 Move authenticated terminals between ports
10.3.6 Account function