Configuration Guide Vol. 2


10.3.2 Forced authentication

For details about the forced authentication operation for MAC-based authentication, see 5.3 Common Layer 2 authentication functionality.