iii
802.1X client as the initiator ····················································································································· 81
Access device as the initiator ··················································································································· 81
802.1X authentication procedures ··················································································································· 81
Comparing EAP relay and EAP termination ····························································································· 82
EAP relay ················································································································································· 82
EAP termination ······································································································································· 84
Configuring 802.1X ······················································································· 86
Hewlett Packard Enterprise implementation of 802.1X ···················································································· 86
Access control methods ··························································································································· 86
Using 802.1X authentication with other features ······················································································ 86
Configuration prerequisites ······························································································································ 89
802.1X configuration task list ··························································································································· 89
Enabling 802.1X ··············································································································································· 90
Enabling EAP relay or EAP termination ··········································································································· 90
Setting the port authorization state ·················································································································· 91
Specifying an access control method ·············································································································· 92
Setting the maximum number of concurrent 802.1X users on a port ······························································· 92
Setting the maximum number of authentication request attempts ··································································· 93
Setting the 802.1X authentication timeout timers ···························································································· 93
Configuring the online user handshake function ······························································································ 93
Configuration guidelines ··························································································································· 94
Configuration procedure ··························································································································· 94
Enabling the proxy detection function ·············································································································· 94
Configuring the authentication trigger function ································································································ 95
Configuration guidelines ··························································································································· 95
Configuration procedure ··························································································································· 95
Specifying a mandatory authentication domain on a port ················································································ 96
Configuring the quiet timer ······························································································································· 96
Enabling the periodic online user re-authentication function ··········································································· 97
Configuring an 802.1X guest VLAN ················································································································· 97
Configuration guidelines ··························································································································· 97
Configuration prerequisites ······················································································································ 98
Configuration procedure ··························································································································· 98
Configuring an Auth-Fail VLAN ························································································································ 98
Configuration guidelines ··························································································································· 98
Configuration prerequisites ······················································································································ 98
Configuration procedure ··························································································································· 98
Configuring an 802.1X critical VLAN ················································································································ 99
Configuration guidelines ··························································································································· 99
Configuration prerequisites ······················································································································ 99
Configuration procedure ··························································································································· 99
Specifying supported domain name delimiters ······························································································ 100
Configuring 802.1X MAC address binding ····································································································· 100
Displaying and maintaining 802.1X ················································································································ 101
802.1X authentication configuration example ································································································ 101
Network requirements ···························································································································· 101
Configuration procedure ························································································································· 102
Verifying the configuration ······················································································································ 103
802.1X guest VLAN and VLAN assignment configuration example ······························································ 103
Network requirements ···························································································································· 103
Configuration procedure ························································································································· 104
Verifying the configuration ······················································································································ 106
802.1X with ACL assignment configuration example ····················································································· 106
Network requirements ···························································································································· 106
Configuration procedure ························································································································· 106
Verifying the configuration ······················································································································ 107
Configuring EAD fast deployment ······························································· 108
Overview ························································································································································ 108
Free IP ··················································································································································· 108
URL redirection ······································································································································ 108