1 802.1x Configuration ·································································································································1-1
Introduction to 802.1x······························································································································1-1
Timers Used in 802.1x·····················································································································1-9
Basic 802.1x Configuration ···················································································································1-14
Configuration Prerequisites ···········································································································1-14
Configuring Proxy Checking··········································································································1-16
Configuring Guest VLAN ···············································································································1-18
Configuration Example··························································································································1-20
802.1x Configuration Example ······································································································1-20
Configuration Prerequisites ·············································································································2-2
Configuration Procedure··················································································································2-2
Troubleshooting ······································································································································2-5
3 HABP Configuration ··································································································································3-1
Introduction to HABP·······························································································································3-1
HABP Server Configuration ····················································································································3-1
HABP Client Configuration······················································································································3-2
4 System Guard Configuration····················································································································4-1
System-Guard Overview ·························································································································4-1
Configuring the System-Guard Feature ··························································································4-1
Table of Contents
i