EAP termination ····················································································································································· 66
Configuring 802.1X ·················································································································································· 68
HP implementation of 802.1X ······································································································································ 68
Configuration prerequisites ··········································································································································· 68
802.1X configuration task list ······································································································································· 68
Enabling 802.1X ···························································································································································· 69
Configuration guidelines ······································································································································ 73
Configuration procedure ······································································································································ 73
Configuring the quiet timer ··········································································································································· 74
Network requirements ··········································································································································· 75
Configuration procedure ······································································································································ 75
Verifying the configuration ··································································································································· 77
Configuring MAC authentication ······························································································································ 78
Overview ········································································································································································· 78
User account policies ············································································································································ 78
Authentication methods········································································································································· 78
Configuration prerequisites ··········································································································································· 79
Configuration task list ···················································································································································· 79
Enabling MAC authentication ······································································································································ 79
Network requirements ··········································································································································· 82
Configuration procedure ······································································································································ 82
Verifying the configuration ··································································································································· 83
Network requirements ··········································································································································· 84
Configuration procedure ······································································································································ 84
Verifying the configuration ··································································································································· 85
Configuring port security ··········································································································································· 87
Overview ········································································································································································· 87
Port security features ············································································································································· 87
Port security modes ··············································································································································· 87
Configuration task list ···················································································································································· 90
Enabling port security ···················································································································································· 90
Setting the port security mode ······································································································································ 91
ii