Introduction to 802.1x······························································································································1-1
Timers Used in 802.1x·····················································································································1-8
Basic 802.1x Configuration ···················································································································1-12
Configuration Prerequisites ···········································································································1-12
Configuring Proxy Checking··········································································································1-17
Configuring Guest VLAN ···············································································································1-18
Configuration Example··························································································································1-20
802.1x Configuration Example ······································································································1-20
2 HABP Configuration ··································································································································2-1
Introduction to HABP·······························································································································2-1
HABP Server Configuration ····················································································································2-1
HABP Client Configuration······················································································································2-2
Displaying HABP·····································································································································2-2
3 System-Guard Configuration ···················································································································3-1
System-Guard Overview ·························································································································3-1
Configuring the System-Guard Feature ··························································································3-1
Table of Contents
i