3Com WX3000 Series Operation Manual page 221

Unified switches switching engine
Table of Contents

Advertisement

Introduction to 802.1x······························································································································1-1
The Mechanism of an 802.1x Authentication System ·····································································1-3
Encapsulation of EAPoL Messages ································································································1-3
802.1x Authentication Procedure ····································································································1-5
Timers Used in 802.1x·····················································································································1-8
Additional 802.1x Features Implemented························································································1-9
Introduction to 802.1x Configuration ·····································································································1-11
Basic 802.1x Configuration ···················································································································1-12
Configuration Prerequisites ···········································································································1-12
Configuring Basic 802.1x Functions······························································································1-12
Timer and Maximum User Number Configuration·········································································1-14
Advanced 802.1x Configuration············································································································1-15
Configuring Proxy Checking··········································································································1-15
Configuring Client Version Checking·····························································································1-16
Enabling DHCP-triggered Authentication ······················································································1-17
Configuring Guest VLAN ···············································································································1-17
Configuring 802.1x Re-Authentication···························································································1-18
Configuring the 802.1x Re-Authentication Timer ··········································································1-18
Displaying and Maintaining 802.1x ·······································································································1-19
Configuration Example··························································································································1-19
802.1x Configuration Example ······································································································1-19
2 Quick EAD Deployment Configuration····································································································2-1
Introduction to Quick EAD Deployment ··································································································2-1
Quick EAD Deployment Overview···································································································2-1
Operation of Quick EAD Deployment······························································································2-1
Configuring Quick EAD Deployment·······································································································2-1
Configuration Prerequisites ·············································································································2-1
Configuration Procedure··················································································································2-2
Displaying and Maintaining Quick EAD Deployment ······································································2-3
Quick EAD Deployment Configuration Example·····················································································2-3
Troubleshooting ······································································································································2-4
3 System-Guard Configuration ···················································································································3-1
System-Guard Overview ·························································································································3-1
Configuring the System-Guard Feature ··································································································3-1
Configuring the System-Guard Feature ··························································································3-1
Displaying and Maintaining System-Guard·····························································································3-2
Table of Contents
i

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wx3024Wx3010Wx3008

Table of Contents