Introduction to 802.1x······························································································································1-1
Timers Used in 802.1x·····················································································································1-8
Basic 802.1x Configuration ···················································································································1-12
Configuration Prerequisites ···········································································································1-12
Configuring Proxy Checking··········································································································1-15
Configuring Guest VLAN ···············································································································1-17
Configuration Example··························································································································1-19
802.1x Configuration Example ······································································································1-19
Configuration Prerequisites ·············································································································2-1
Configuration Procedure··················································································································2-2
Troubleshooting ······································································································································2-4
3 System-Guard Configuration ···················································································································3-1
System-Guard Overview ·························································································································3-1
Configuring the System-Guard Feature ··························································································3-1
Table of Contents
i