H3C Technologies H3C S3600 Series Switches User Manual
Page 472
i
Table of Contents
1 802.1x Configuration ·································································································································1-1
Introduction to 802.1x······························································································································1-1
Architecture of 802.1x Authentication······························································································1-1
802.1x Authentication Procedure ····································································································1-5
Timers Used in 802.1x·····················································································································1-8
Introduction to 802.1x Configuration ·····································································································1-12
Basic 802.1x Configuration ···················································································································1-13
Configuration Prerequisites ···········································································································1-13
Configuring Basic 802.1x Functions······························································································1-13
Advanced 802.1x Configuration············································································································1-15
Configuring Proxy Checking ··········································································································1-16
Configuring Client Version Checking·····························································································1-16
Configuring Guest VLAN ···············································································································1-17
Displaying and Maintaining 802.1x Configuration·················································································1-19
Configuration Example··························································································································1-19
802.1x Configuration Example ······································································································1-19
2 Quick EAD Deployment Configuration····································································································2-1
Introduction to Quick EAD Deployment ··································································································2-1
Quick EAD Deployment Overview···································································································2-1
Configuring Quick EAD Deployment·······································································································2-2
Configuration Prerequisites ·············································································································2-2
Configuration Procedure··················································································································2-2
Troubleshooting ······································································································································2-5
3 HABP Configuration ··································································································································3-1
Introduction to HABP·······························································································································3-1
HABP Server Configuration ····················································································································3-1
HABP Client Configuration······················································································································3-2
Displaying and Maintaining HABP Configuration····················································································3-2
4 System Guard Configuration····················································································································4-1
System Guard Overview ·························································································································4-1
Guard Against IP Attacks ················································································································4-1
Guard Against TCN Attacks ············································································································4-1