i
Table of Contents
1 802.1x Configuration·································································································································1-1
Introduction to 802.1x······························································································································1-1
Architecture of 802.1x Authentication······························································································1-1
The Mechanism of an 802.1x Authentication System·····································································1-3
Encapsulation of EAPoL Messages································································································1-3
802.1x Authentication Procedure····································································································1-5
Timers Used in 802.1x·····················································································································1-9
Additional 802.1x Features on Switch 4500··················································································1-10
Introduction to 802.1x Configuration·····································································································1-13
Basic 802.1x Configuration···················································································································1-14
Configuration Prerequisites···········································································································1-14
Configuring Basic 802.1x Functions······························································································1-14
Timer and Maximum User Number Configuration·········································································1-15
Advanced 802.1x Configuration············································································································1-16
Configuring Proxy Checking··········································································································1-16
Configuring Client Version Checking·····························································································1-17
Enabling DHCP-triggered Authentication······················································································1-18
Configuring Guest VLAN···············································································································1-18
Configuring 802.1x Re-Authentication···························································································1-19
Configuring the 802.1x Re-Authentication Timer··········································································1-19
Displaying and Maintaining 802.1x Configuration·················································································1-20
Configuration Example··························································································································1-20
802.1x Configuration Example······································································································1-20
2 Quick EAD Deployment Configuration····································································································2-1
Introduction to Quick EAD Deployment·································································································· 2-1
Quick EAD Deployment Overview···································································································2-1
Operation of Quick EAD Deployment······························································································2-1
Configuring Quick EAD Deployment·······································································································2-2
Configuration Prerequisites·············································································································2-2
Configuration Procedure··················································································································2-2
Displaying and Maintaining Quick EAD Deployment ······································································2-3
Quick EAD Deployment Configuration Example·····················································································2-3
Troubleshooting······································································································································ 2-4
3 HABP Configuration··································································································································3-1
Introduction to HABP·······························································································································3-1
HABP Server Configuration···················································································································· 3-1
HABP Client Configuration······················································································································3-2
Displaying and Maintaining HABP Configuration····················································································3-2
4 System Guard Configuration····················································································································4-1
System Guard Overview·························································································································4-1
Guard Against IP Attacks················································································································ 4-1
Guard Against TCN Attacks············································································································ 4-1