Troubleshooting IGMP Snooping........................................................................................................ 27-20
28 802.1x Configuration.............................................................................................................................. 28-1
Introduction to 802.1x............................................................................................................................ 28-1
The Mechanism of an 802.1x Authentication System ................................................................... 28-3
802.1x Authentication Procedure .................................................................................................. 28-5
Timers Used in 802.1x................................................................................................................... 28-8
Configuration Prerequisites ......................................................................................................... 28-13
Enabling DHCP-triggered Authentication .................................................................................... 28-17
Configuration Example........................................................................................................................ 28-19
29 Quick EAD Deployment Configuration ................................................................................................ 29-1
Operation of Quick EAD Deployment............................................................................................ 29-1
Configuration Prerequisites ........................................................................................................... 29-2
Configuration Procedure................................................................................................................ 29-2
Troubleshooting .................................................................................................................................... 29-5
30 HABP Configuration .............................................................................................................................. 30-1
Introduction to HABP............................................................................................................................. 30-1
HABP Server Configuration .................................................................................................................. 30-1
31 System Guard Configuration ................................................................................................................ 31-1
System Guard Overview ....................................................................................................................... 31-1
Guard Against IP Attacks .............................................................................................................. 31-1
Guard Against TCN Attacks .......................................................................................................... 31-1
x