50
802.1X CONFIGURATION
When configuring 802.1x, go to these sections for information you are interested 
in:
■ “802.1x Overview” on page 715
■ “Configuring 802.1x” on page 726
■ “Configuring a Guest VLAN” on page 728
■ “Displaying and Maintaining 802.1x” on page 729
■ “802.1x Configuration Example” on page 729
■ “Guest VLAN Configuration Example” on page 732
■ “ACL Assignment Configuration Example” on page 735
802.1x Overview The 802.1x protocol was proposed by IEEE 802 LAN/WAN committee for security 
problems on wireless LANs (WLAN). Currently, it is widely used on Ethernet as a 
common port access control mechanism.
As a port-based network access control protocol, 802.1x authenticates and 
controls accessing devices at the level of port. A device connected to an 
802.1x-enabled port of an access control device can access the resources on the 
LAN only after passing authentication.
To get more information about 802.1x, go to these topics:
■ “Architecture of 802.1x” on page 715
■ “Operation of 802.1x” on page 717
■ “EAP Encapsulation over LANs” on page 717
■ “EAP Encapsulation over RADIUS” on page 719
■ “Authentication Process of 802.1x” on page 720
■ “802.1x Timers” on page 723
■ “Implementation of 802.1x in the Devices” on page 724
■ “Features Working Together with 802.1x” on page 724
Architecture of 802.1x 802.1x operates in the typical client/server model and defines three entities: 
supplicant system, authenticator system, and authentication server system, as 
shown in Figure 210.