i 
Table of Contents 
1 802.1x Configuration·································································································································1-1 
Introduction to 802.1x······························································································································1-1 
Architecture of 802.1x Authentication······························································································1-1 
The Mechanism of an 802.1x Authentication System·····································································1-3 
Encapsulation of EAPoL Messages ································································································1-3 
802.1x Authentication Procedure ····································································································1-5 
Timers Used in 802.1x·····················································································································1-9 
Additional 802.1x Features on Switch 4200G···············································································1-10 
Introduction to 802.1x Configuration·····································································································1-13 
Basic 802.1x Configuration···················································································································1-14 
Configuration Prerequisites···········································································································1-14 
Configuring Basic 802.1x Functions······························································································1-14 
Timer and Maximum User Number Configuration·········································································1-15 
Advanced 802.1x Configuration············································································································1-16 
Configuring Proxy Checking··········································································································1-16 
Configuring Client Version Checking·····························································································1-17 
Enabling DHCP-triggered Authentication······················································································1-18 
Configuring Guest VLAN···············································································································1-18 
Configuring 802.1x Re-Authentication···························································································1-19 
Configuring the 802.1x Re-Authentication Timer ··········································································1-19 
Displaying and Maintaining 802.1x Configuration·················································································1-20 
Configuration Example··························································································································1-20 
802.1x Configuration Example ······································································································1-20 
2 Quick EAD Deployment Configuration····································································································2-1 
Introduction to Quick EAD Deployment ··································································································2-1 
Quick EAD Deployment Overview···································································································2-1 
Operation of Quick EAD Deployment······························································································2-1 
Configuring Quick EAD Deployment·······································································································2-2 
Configuration Prerequisites·············································································································2-2 
Configuration Procedure··················································································································2-2 
Displaying and Maintaining Quick EAD Deployment ······································································2-3 
Quick EAD Deployment Configuration Example·····················································································2-3 
Troubleshooting ······································································································································2-5 
3 HABP Configuration··································································································································3-1 
Introduction to HABP·······························································································································3-1 
HABP Server Configuration ····················································································································3-1 
HABP Client Configuration······················································································································3-2 
Displaying and Maintaining HABP Configuration····················································································3-2 
4 System Guard Configuration····················································································································4-1 
System-Guard Overview·························································································································4-1 
Configuring the System-Guard Feature··································································································4-1 
Configuring the System-Guard Feature ··························································································4-1