802.1X Configuration; Introduction To 802.1X; Architecture Of 802.1X Authentication - 3Com 5500-EI PWR Install Manual

Hide thumbs Also See for 5500-EI PWR:
Table of Contents

Advertisement

1

802.1x Configuration

When configuring 802.1x, go to these sections for information you are interested in:

Introduction to 802.1x

Introduction to 802.1x Configuration
Basic 802.1x Configuration
Advanced 802.1x Configuration
Displaying and Maintaining 802.1x Configuration
Configuration Example
Introduction to 802.1x
The 802.1x protocol (802.1x for short) was developed by IEEE802 LAN/WAN committee to address
security issues of wireless LANs. It was then used in Ethernet as a common access control mechanism
for LAN ports to address mainly authentication and security problems.
802.1x is a port-based network access control protocol. It is used to perform port-level authentication
and control of devices connected to the 802.1x-enabled ports. With the 802.1x protocol employed, a
user-side device can access the LAN only when it passes the authentication. Those devices that fail to
pass the authentication are denied access to the LAN.
This section covers these topics:

Architecture of 802.1x Authentication

The Mechanism of an 802.1x Authentication System
Encapsulation of EAPoL Messages
802.1x Authentication Procedure
Timers Used in 802.1x
Additional 802.1x Features on
Architecture of 802.1x Authentication
As shown in
Figure
system, an authenticator system, and an authentication server system.
1-1, 802.1x adopts a client/server architecture with three entities: a supplicant
1-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

5500-ei series

Table of Contents