EasyManua.ls Logo

3Com 4500 - Table of Contents

3Com 4500
742 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
i
Table of Contents
1 802.1x Configuration·································································································································1-1
Introduction to 802.1x······························································································································1-1
Architecture of 802.1x Authentication······························································································1-1
The Mechanism of an 802.1x Authentication System ·····································································1-3
Encapsulation of EAPoL Messages ································································································1-3
802.1x Authentication Procedure ····································································································1-5
Timers Used in 802.1x·····················································································································1-9
Additional 802.1x Features on Switch 4500··················································································1-10
Introduction to 802.1x Configuration ·····································································································1-13
Basic 802.1x Configuration ···················································································································1-14
Configuration Prerequisites ···········································································································1-14
Configuring Basic 802.1x Functions······························································································1-14
Timer and Maximum User Number Configuration·········································································1-15
Advanced 802.1x Configuration············································································································1-16
Configuring Proxy Checking··········································································································1-16
Configuring Client Version Checking·····························································································1-17
Enabling DHCP-triggered Authentication ······················································································1-18
Configuring Guest VLAN ···············································································································1-18
Configuring 802.1x Re-Authentication···························································································1-19
Configuring the 802.1x Re-Authentication Timer ··········································································1-19
Displaying and Maintaining 802.1x Configuration·················································································1-20
Configuration Example··························································································································1-20
802.1x Configuration Example ······································································································1-20
2 Quick EAD Deployment Configuration····································································································2-1
Introduction to Quick EAD Deployment ··································································································2-1
Quick EAD Deployment Overview···································································································2-1
Operation of Quick EAD Deployment······························································································2-1
Configuring Quick EAD Deployment·······································································································2-2
Configuration Prerequisites ·············································································································2-2
Configuration Procedure··················································································································2-2
Displaying and Maintaining Quick EAD Deployment ······································································2-3
Quick EAD Deployment Configuration Example·····················································································2-3
Troubleshooting ······································································································································2-4
3 HABP Configuration··································································································································3-1
Introduction to HABP·······························································································································3-1
HABP Server Configuration ····················································································································3-1
HABP Client Configuration······················································································································3-2
Displaying and Maintaining HABP Configuration····················································································3-2
4 System Guard Configuration····················································································································4-1
System Guard Overview ·························································································································4-1
Guard Against IP Attacks ················································································································4-1
Guard Against TCN Attacks ············································································································4-1

Table of Contents

Other manuals for 3Com 4500

Related product manuals