EasyManua.ls Logo

Huawei Quidway S3100 Series

Huawei Quidway S3100 Series
514 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Operation Manual – 802.1x
Quidway S3100 Series Ethernet Switches Table of Contents
Huawei Technologies Proprietary
i
Table of Contents
Chapter 1 802.1x Configuration ................................................................................................... 1-1
1.1 Introduction to 802.1x ........................................................................................................ 1-1
1.1.1 Architecture of 802.1x Authentication ..................................................................... 1-1
1.1.2 The Mechanism of an 802.1x Authentication System............................................. 1-3
1.1.3 Encapsulation of EAPoL Messages........................................................................ 1-3
1.1.4 802.1x Authentication Procedure............................................................................ 1-6
1.1.5 802.1x Timer ........................................................................................................... 1-9
1.1.6 802.1x Implementation on an S3100 Series Switch ............................................. 1-10
1.2 802.1x Configuration........................................................................................................ 1-12
1.3 Basic 802.1x Configuration.............................................................................................. 1-13
1.3.1 Prerequisites ......................................................................................................... 1-13
1.3.2 Configuring Basic 802.1x Functions...................................................................... 1-13
1.4 Timer and Maximum User Number Configuration........................................................... 1-15
1.5 Advanced 802.1x Configuration....................................................................................... 1-16
1.5.1 Prerequisites ......................................................................................................... 1-17
1.5.2 Configuring Proxy Checking.................................................................................. 1-17
1.5.3 Configuring Client Version Checking .................................................................... 1-18
1.5.4 Enabling DHCP-triggered Authentication.............................................................. 1-18
1.5.5 Configuring Guest VLAN....................................................................................... 1-19
1.6 Displaying and Debugging 802.1x................................................................................... 1-19
1.7 802.1x Configuration Example......................................................................................... 1-20
Chapter 2 HABP Configuration.................................................................................................... 2-1
2.1 Introduction to HABP ......................................................................................................... 2-1
2.2 HABP Server Configuration............................................................................................... 2-1
2.3 HABP Client Configuration ................................................................................................ 2-2
2.4 Displaying and Debugging HABP...................................................................................... 2-2
Chapter 3 System-guard Configuration...................................................................................... 3-1
3.1 System-guard Overview .................................................................................................... 3-1
3.2 System-guard Configuration.............................................................................................. 3-1
3.2.1 Enabling the System-guard function....................................................................... 3-1
3.2.2 Configuring system-guard-related Parameters....................................................... 3-1
3.2.3 Specifying system-guard-enabled ports.................................................................. 3-2
3.3 Displaying and Debugging the System-guard Function .................................................... 3-2
3.4 System-guard Configuration Example............................................................................... 3-2

Table of Contents

Related product manuals