H3C S3100-52P Operation Manual page 360

Hide thumbs Also See for S3100-52P:
Table of Contents

Advertisement

Operation Manual - 802.1x and System Guard
H3C S3100-52P Ethernet switch
Chapter 1 802.1x Configuration ................................................................................................... 1-1
1.1 Introduction to 802.1x ........................................................................................................ 1-1
1.1.1 Architecture of 802.1x Authentication ..................................................................... 1-2
1.1.2 The Mechanism of an 802.1x Authentication System............................................. 1-3
1.1.3 Encapsulation of EAPoL Messages ........................................................................ 1-4
1.1.4 802.1x Authentication Procedure ............................................................................ 1-7
1.1.5 Timers Used in 802.1x .......................................................................................... 1-10
1.1.6 802.1x Implementation on an S3100-52P Switch ................................................. 1-11
1.2 Introduction to 802.1x Configuration................................................................................ 1-15
1.3 Basic 802.1x Configuration.............................................................................................. 1-16
1.3.1 Configuration Prerequisites................................................................................... 1-16
1.3.2 Configuring Basic 802.1x Functions...................................................................... 1-16
1.3.3 Timer and Maximum User Number Configuration ................................................ 1-18
1.4 Advanced 802.1x Configuration....................................................................................... 1-20
1.4.1 Configuring Proxy Checking.................................................................................. 1-20
1.4.2 Configuring Client Version Checking .................................................................... 1-21
1.4.3 Enabling DHCP-triggered Authentication.............................................................. 1-22
1.4.4 Configuring Guest VLAN....................................................................................... 1-22
1.4.5 Configuring 802.1x Re-Authentication .................................................................. 1-23
1.4.6 Configuring the 802.1x Re-Authentication Timer .................................................. 1-23
1.5 Displaying and Maintaining 802.1x Configuration ........................................................... 1-24
1.6 Configuration Example .................................................................................................... 1-24
1.6.1 802.1x Configuration Example .............................................................................. 1-24
Chapter 2 Quick EAD Deployment Configuration...................................................................... 2-1
2.1 Introduction to Quick EAD Deployment ............................................................................. 2-1
2.1.1 Quick EAD Deployment Overview .......................................................................... 2-1
2.1.2 Operation of Quick EAD Deployment...................................................................... 2-1
2.2 Configuring Quick EAD Deployment.................................................................................. 2-2
2.2.1 Configuration Prerequisites..................................................................................... 2-2
2.2.2 Configuration Procedure ......................................................................................... 2-2
2.2.3 Displaying and Maintaining Quick EAD Deployment .............................................. 2-4
2.3 Quick EAD Deployment Configuration Example ............................................................... 2-4
2.4 Troubleshooting ................................................................................................................. 2-5
Chapter 3 HABP Configuration .................................................................................................... 3-1
3.1 Introduction to HABP ......................................................................................................... 3-1
3.2 HABP Server Configuration ............................................................................................... 3-1
3.3 HABP Client Configuration ................................................................................................ 3-2
Table of Contents
i
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents