beautypg.com

H3C Technologies H3C S3600 Series Switches User Manual

Page 472

background image

i

Table of Contents

1 802.1x Configuration ·································································································································1-1

Introduction to 802.1x······························································································································1-1

Architecture of 802.1x Authentication······························································································1-1

The Mechanism of an 802.1x Authentication System ·····································································1-3

Encapsulation of EAPoL Messages ································································································1-3

802.1x Authentication Procedure ····································································································1-5

Timers Used in 802.1x·····················································································································1-8

802.1x Implementation on an S3600 Series Switch········································································1-9

Introduction to 802.1x Configuration ·····································································································1-12

Basic 802.1x Configuration ···················································································································1-13

Configuration Prerequisites ···········································································································1-13

Configuring Basic 802.1x Functions······························································································1-13

Timer and Maximum User Number Configuration·········································································1-14

Advanced 802.1x Configuration············································································································1-15

Configuring Proxy Checking ··········································································································1-16

Configuring Client Version Checking·····························································································1-16

Enabling DHCP-triggered Authentication ······················································································1-17

Configuring Guest VLAN ···············································································································1-17

Configuring 802.1x Re-Authentication···························································································1-18

Configuring the 802.1x Re-Authentication Timer ··········································································1-18

Displaying and Maintaining 802.1x Configuration·················································································1-19

Configuration Example··························································································································1-19

802.1x Configuration Example ······································································································1-19

2 Quick EAD Deployment Configuration····································································································2-1

Introduction to Quick EAD Deployment ··································································································2-1

Quick EAD Deployment Overview···································································································2-1

Operation of Quick EAD Deployment······························································································2-1

Configuring Quick EAD Deployment·······································································································2-2

Configuration Prerequisites ·············································································································2-2

Configuration Procedure··················································································································2-2

Displaying and Maintaining Quick EAD Deployment ······································································2-3

Quick EAD Deployment Configuration Example·····················································································2-3

Troubleshooting ······································································································································2-5

3 HABP Configuration ··································································································································3-1

Introduction to HABP·······························································································································3-1

HABP Server Configuration ····················································································································3-1

HABP Client Configuration······················································································································3-2

Displaying and Maintaining HABP Configuration····················································································3-2

4 System Guard Configuration····················································································································4-1

System Guard Overview ·························································································································4-1

Guard Against IP Attacks ················································································································4-1

Guard Against TCN Attacks ············································································································4-1

This manual is related to the following products: