beautypg.com

H3C Technologies H3C S7500E Series Switches User Manual

Page 8

background image

ii

4 Troubleshooting AAA································································································································4-1

Troubleshooting RADIUS ················································································································4-1

Troubleshooting HWTACACS ·········································································································4-2

5 802.1X Configuration·································································································································5-1

802.1X Overview·····································································································································5-1

Architecture of 802.1X ·····················································································································5-2

Authentication Modes of 802.1X ·····································································································5-2

Basic Concepts of 802.1X ···············································································································5-2

EAP over LAN ·································································································································5-3

EAP over RADIUS···························································································································5-5

802.1X Authentication Triggering ····································································································5-5

Authentication Process of 802.1X ···································································································5-6

Features Working Together with 802.1X·························································································5-9

802.1X Configuration ····························································································································5-12

Configuration Prerequisites ···········································································································5-12

802.1X Configuration Task List ·····································································································5-12

Enabling 802.1X on a Port ············································································································5-13

Specifying the Authentication Method of 802.1X Users ································································5-14

Specifying the Port Authorization Mode ························································································5-14

Specifying the Access Control Method··························································································5-15

Configuring the Maximum Number of Users Accessible to a Port ················································5-16

Setting the Maximum Number of Attempts for Sending an Authentication Request ····················5-16

Setting 802.1X Timers ···················································································································5-17

Configuring the Online User Handshake Function········································································5-18

Enabling the Proxy Detection Function ·························································································5-19

Enabling the Multicast Trigger Function ························································································5-20

Enabling the Unicast Trigger Function ··························································································5-20

Specifying a Mandatory Authentication Domain for a Port····························································5-21

Enabling the Quiet Timer···············································································································5-21

Enabling the Re-Authentication Function ······················································································5-22

Configuring a Guest VLAN ············································································································5-22

Configuring an Auth-Fail VLAN ·····································································································5-24

Displaying and Maintaining 802.1X·······································································································5-25

802.1X Configuration Examples ···········································································································5-25

802.1X Authentication Configuration Example··············································································5-25

802.1X with Guest VLAN and VLAN Assignment Configuration Example····································5-27

802.1X with ACL Assignment Configuration Example ··································································5-29

6 802.1X-Based EAD Fast Deployment Configuration··············································································6-1

EAD Fast Deployment Overview ············································································································6-1

EAD Fast Deployment Implementation ···························································································6-1

Configuring EAD Fast Deployment ·········································································································6-1

Configuration Prerequisites ·············································································································6-2

Configuration Procedure··················································································································6-2

Displaying and Maintaining EAD Fast Deployment ················································································6-3

EAD Fast Deployment Configuration Example·······················································································6-4