5 802.1x configuration, 1x overview, 1x configuration – H3C Technologies H3C S7500E Series Switches User Manual
Page 91
5-1
5
802.1X Configuration
This chapter includes these sections:
z
z
z
Displaying and Maintaining 802.1X
z
802.1X Overview
The 802.1X protocol was proposed by IEEE 802 LAN/WAN committee for security of wireless
LANs (WLANs). However, it has been widely used on Ethernet as a common port access
control mechanism.
As a port-based network access control protocol, 802.1X authenticates devices connected to
the 802.1X-enabled LAN ports to control their access to the LAN.
The port security feature provides rich security modes that combine or extend 802.1X and MAC
address authentication. In a networking environment that requires flexible use of 802.1X and
MAC address authentication, you are recommended to configure the port security feature. In a
network environment that requires only 802.1X authentication, you are recommended to
configure the 802.1X directly rather than configure the port security feature for simplicity sake.
For how to use the port security feature, see Port Security Configuration in the Security
Configuration Guide.
To get more information about 802.1X, go to these topics:
z
z
Authentication Modes of 802.1X
z
z
z
z
802.1X Authentication Triggering
z
Authentication Process of 802.1X
z