Huawei Quidway S3100 Series Operation Manual page 202

Table of Contents

Advertisement

Operation Manual - 802.1x
Quidway S3100 Series Ethernet Switches
Chapter 1 802.1x Configuration ................................................................................................... 1-1
1.1 Introduction to 802.1x ........................................................................................................ 1-1
1.1.1 Architecture of 802.1x Authentication ..................................................................... 1-1
1.1.2 The Mechanism of an 802.1x Authentication System............................................. 1-3
1.1.3 Encapsulation of EAPoL Messages ........................................................................ 1-3
1.1.4 802.1x Authentication Procedure ............................................................................ 1-6
1.1.5 802.1x Timer ........................................................................................................... 1-9
1.1.6 802.1x Implementation on an S3100 Series Switch ............................................. 1-10
1.2 802.1x Configuration........................................................................................................ 1-12
1.3 Basic 802.1x Configuration.............................................................................................. 1-13
1.3.1 Prerequisites ......................................................................................................... 1-13
1.3.2 Configuring Basic 802.1x Functions...................................................................... 1-13
1.4 Timer and Maximum User Number Configuration ........................................................... 1-15
1.5 Advanced 802.1x Configuration....................................................................................... 1-16
1.5.1 Prerequisites ......................................................................................................... 1-17
1.5.2 Configuring Proxy Checking.................................................................................. 1-17
1.5.3 Configuring Client Version Checking .................................................................... 1-18
1.5.4 Enabling DHCP-triggered Authentication.............................................................. 1-18
1.5.5 Configuring Guest VLAN....................................................................................... 1-19
1.6 Displaying and Debugging 802.1x ................................................................................... 1-19
1.7 802.1x Configuration Example......................................................................................... 1-20
Chapter 2 HABP Configuration .................................................................................................... 2-1
2.1 Introduction to HABP ......................................................................................................... 2-1
2.2 HABP Server Configuration ............................................................................................... 2-1
2.3 HABP Client Configuration ................................................................................................ 2-2
2.4 Displaying and Debugging HABP ...................................................................................... 2-2
Chapter 3 System-guard Configuration ...................................................................................... 3-1
3.1 System-guard Overview .................................................................................................... 3-1
3.2 System-guard Configuration .............................................................................................. 3-1
3.2.1 Enabling the System-guard function ....................................................................... 3-1
3.2.2 Configuring system-guard-related Parameters ....................................................... 3-1
3.2.3 Specifying system-guard-enabled ports.................................................................. 3-2
3.3 Displaying and Debugging the System-guard Function .................................................... 3-2
3.4 System-guard Configuration Example ............................................................................... 3-2
Table of Contents
Huawei Technologies Proprietary
i
Table of Contents

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents