3Com 4210 9-Port Configuration Manual page 289

Switch 4210 family
Hide thumbs Also See for 4210 9-Port:
Table of Contents

Advertisement

Introduction to 802.1x······························································································································1-1
Architecture of 802.1x Authentication······························································································1-1
The Mechanism of an 802.1x Authentication System ·····································································1-2
Encapsulation of EAPoL Messages ································································································1-3
802.1x Authentication Procedure ····································································································1-5
Timers Used in 802.1x·····················································································································1-8
802.1x Implementation on an S4210 Series Switch········································································1-9
Introduction to 802.1x Configuration ·····································································································1-12
Basic 802.1x Configuration ···················································································································1-12
Configuration Prerequisites ···········································································································1-12
Configuring Basic 802.1x Functions······························································································1-13
Timer and Maximum User Number Configuration·········································································1-14
Advanced 802.1x Configuration············································································································1-15
Specifying a Mandatory Authentication Domain for a Port····························································1-15
Configuring Proxy Checking··········································································································1-17
Configuring Client Version Checking·····························································································1-17
Enabling DHCP-triggered Authentication ······················································································1-18
Configuring Guest VLAN ···············································································································1-18
Configuring 802.1x Re-Authentication···························································································1-19
Configuring the 802.1x Re-Authentication Timer ··········································································1-19
Displaying and Debugging 802.1x ········································································································1-20
Configuration Example··························································································································1-20
802.1x Configuration Example ······································································································1-20
802.1X Mandatory Authentication Domain Configuration Example ··············································1-23
2 HABP Configuration ··································································································································2-1
Introduction to HABP·······························································································································2-1
HABP Server Configuration ····················································································································2-1
HABP Client Configuration······················································································································2-2
Displaying HABP·····································································································································2-2
3 System-Guard Configuration ···················································································································3-1
System-Guard Overview ·························································································································3-1
Configuring the System-Guard Feature ··································································································3-1
Configuring the System-Guard Feature ··························································································3-1
Displaying and Maintaining System-Guard·····························································································3-2
Table of Contents
i

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents