i
Table of Contents
1 802.1x Configuration ···································································································· 1-1
Introduction to 802.1x ································································································· 1-1
Architecture of 802.1x Authentication ···································································· 1-1
The Mechanism of an 802.1x Authentication System·············································· 1-3
Encapsulation of EAPoL Messages ······································································· 1-4
802.1x Authentication Procedure··········································································· 1-6
Timers Used in 802.1x ·························································································· 1-9
802.1x Implementation on an S5100-SI/EI Series Switch ····································· 1-10
Introduction to 802.1x Configuration·········································································· 1-13
Basic 802.1x Configuration ······················································································· 1-14
Configuration Prerequisites ················································································ 1-14
Configuring Basic 802.1x Functions ···································································· 1-14
Timer and Maximum User Number Configuration ················································· 1-16
Advanced 802.1x Configuration················································································· 1-17
Configuring Proxy Checking················································································ 1-17
Configuring Client Version Checking ··································································· 1-18
Enabling DHCP-triggered Authentication····························································· 1-19
Configuring Guest VLAN····················································································· 1-19
Configuring 802.1x Re-Authentication ································································· 1-20
Configuring the 802.1x Re-Authentication Timer·················································· 1-20
Displaying and Maintaining 802.1x Configuration······················································· 1-21
Configuration Example······························································································ 1-21
802.1x Configuration Example ············································································ 1-21
2 Quick EAD Deployment Configuration ········································································· 2-1
Introduction to Quick EAD Deployment········································································ 2-1
Quick EAD Deployment Overview ········································································· 2-1
Operation of Quick EAD Deployment····································································· 2-1
Configuring Quick EAD Deployment ············································································ 2-2
Configuration Prerequisites ·················································································· 2-2
Configuration Procedure······················································································· 2-2
Displaying and Maintaining Quick EAD Deployment··············································· 2-4
Quick EAD Deployment Configuration Example···························································· 2-4
Troubleshooting·········································································································· 2-5
3 HABP Configuration····································································································· 3-1
Introduction to HABP ·································································································· 3-1
HABP Server Configuration························································································· 3-1
HABP Client Configuration·························································································· 3-2
Displaying and Maintaining HABP Configuration ·························································· 3-2
4 System-Guard Configuration ······················································································· 4-1
System-Guard Overview ····························································································· 4-1