802.1X client as the initiator································································································································ 60
Access device as the initiator ······························································································································· 61
802.1X authentication procedures ······························································································································ 61
EAP relay ································································································································································ 62
EAP termination ····················································································································································· 63
Configuring 802.1X ·················································································································································· 65
HP implementation of 802.1X ······································································································································ 65
Configuration prerequisites ··········································································································································· 65
802.1X configuration task list ······································································································································· 65
Enabling 802.1X ···························································································································································· 66
Configuration guidelines ······································································································································ 69
Configuration procedure ······································································································································ 70
Configuring the quiet timer ··········································································································································· 70
Network requirements ··········································································································································· 71
Configuration procedure ······································································································································ 72
Verifying the configuration ··································································································································· 73
Configuring MAC authentication ······························································································································ 74
Overview ········································································································································································· 74
User account policies ············································································································································ 74
Authentication approaches ·································································································································· 74
Configuration prerequisites ··········································································································································· 75
Configuration task list ···················································································································································· 75
Enabling MAC authentication ······································································································································ 75
Network requirements ··········································································································································· 78
Configuration procedure ······································································································································ 78
Verifying the configuration ··································································································································· 79
Network requirements ··········································································································································· 79
Configuration procedure ······································································································································ 80
Verifying the configuration ··································································································································· 81
Configuring port security ··········································································································································· 82
Overview ········································································································································································· 82
Port security features ············································································································································· 82
Port security modes ··············································································································································· 82
ii