X Configuration; 802.1X Overview - HP 4800G Series Configuration Manual

24/48 port
Table of Contents

Advertisement

1

802.1X Configuration

When configuring 802.1X, go to these sections for information you are interested in:

802.1X Overview

Configuring 802.1X
Configuring an 802.1X Port-based Guest VLAN
Displaying and Maintaining 802.1X
802.1X Configuration Example
Guest VLAN and VLAN Assignment Configuration Example
ACL Assignment Configuration Example
802.1X Overview
The 802.1X protocol was proposed by IEEE802 LAN/WAN committee for security of wireless LANs
(WLAN). It has been widely used on Ethernet as a common port access control mechanism.
As a port-based access control protocol, 802.1X authenticates and controls accessing devices at the
port level. A device connected to an 802.1X-enabled port of an access control device can access the
resources on the LAN only after passing authentication.
The port security feature provides rich security modes that combine or extend 802.1X and MAC
address authentication. In a networking environment that requires flexible use of 802.1X and MAC
address authentication, you are recommended to configure the port security feature. In a network
environment that requires only 802.1X authentication, you are recommended to configure the 802.1X
directly rather than configure the port security feature for simplicity sake. For how to use the port
security feature, refer to Port Security Configuration in the Security Volume.
To get more information about 802.1X, go to these topics:
Architecture of 802.1X
Basic Concepts of 802.1X
EAP over LANs
EAP over RADIUS
802.1X Authentication Triggering
Authentication Process of 802.1X
802.1X Timers
Features Working Together with 802.1X
1-1

Advertisement

Chapters

Table of Contents
loading

Table of Contents