802.1X Configuration; Introduction To 802.1X; Architecture Of 802.1X Authentication - H3C S5100-SI Operation Manual

Ethernet switches
Hide thumbs Also See for H3C S5100-SI:
Table of Contents

Advertisement

1

802.1x Configuration

When configuring 802.1x, go to these sections for information you are interested in:

Introduction to 802.1x

Introduction to 802.1x Configuration
Basic 802.1x Configuration
Advanced 802.1x Configuration
Displaying and Maintaining 802.1x Configuration
Configuration Example
Introduction to 802.1x
The 802.1x protocol (802.1x for short) was developed by IEEE802 LAN/WAN committee to
address security issues of wireless LANs. It was then used in Ethernet as a common
access control mechanism for LAN ports to address mainly authentication and security
problems.
802.1x is a port-based network access control protocol. It authenticates and controls
devices requesting for access in terms of the ports of LAN access devices. With the 802.1x
protocol employed, a user-side device can access the LAN only when it passes the
authentication. Those fail to pass the authentication are denied when accessing the LAN.
This section covers these topics:

Architecture of 802.1x Authentication

The Mechanism of an 802.1x Authentication System
Encapsulation of EAPoL Messages
802.1x Authentication Procedure
Timers Used in 802.1x
802.1x Implementation on an S5100-SI/EI Series Switch
Architecture of 802.1x Authentication
As shown in
Figure
supplicant system, an authenticator system, and an authentication server system.
1-1, 802.1x adopts a client/server architecture with three entities: a
1-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

H3c s5100-ei

Table of Contents