beautypg.com

1 802.1x configuration, 1x overview, Architecture of 802.1x – H3C Technologies H3C S5120 Series Switches User Manual

Page 379: 1x configuration

background image

1-1

1

802.1X Configuration

This chapter includes these sections:

z

802.1X Overview

z

802.1X Configuration Task List

z

802.1X Configuration Example

z

Guest VLAN and VLAN Assignment Configuration Example

z

ACL Assignment Configuration Example

802.1X Overview

The 802.1X protocol was proposed by IEEE 802 LAN/WAN committee for security of wireless LANs

(WLANs). However, it has been widely used on Ethernet as a common port access control mechanism.

As a port-based network access control protocol, 802.1X authenticates devices connected to the

802.1X-enabled LAN ports to control their access to the LAN.

To get more information about 802.1X, go to these topics:

z

Architecture of 802.1X

z

Authentication Modes of 802.1X

z

Basic Concepts of 802.1X

z

EAP over LAN

z

EAP over RADIUS

z

802.1X Authentication Triggering

z

Authentication Process of 802.1X

z

802.1X Access Control Method

z

Features Working Together with 802.1X

Architecture of 802.1X

802.1X operates in the typical client/server model and defines three entities: Client, Device, and Server,

as shown in

Figure 1-1

.

Figure 1-1 Architecture of 802.1X

z

Client is an entity seeking access to the LAN. It resides at one end of a LAN segment and is

authenticated by Device at the other end of the LAN segment. Client is usually a user-end device

such as a PC. 802.1X authentication is triggered when an 802.1X-capable client program is

launched on Client. The client program must support Extensible Authentication Protocol over LAN

(EAPOL).