3Com WX3000 operation manual Table of Contents

Models: WX3000

1 715
Download 715 pages 21.26 Kb
Page 221
Image 221

Table of Contents

1802.1x Configuration ·································································································································1-1Introduction to 802.1x······························································································································1-1 Architecture of 802.1x Authentication······························································································1-1 The Mechanism of an 802.1x Authentication System·····································································1-3 Encapsulation of EAPoL Messages ································································································1-3 802.1x Authentication Procedure ····································································································1-5 Timers Used in 802.1x·····················································································································1-8 Additional 802.1x Features Implemented························································································1-9 Introduction to 802.1x Configuration·····································································································1-11 Basic 802.1x Configuration ···················································································································1-12 Configuration Prerequisites ···········································································································1-12 Configuring Basic 802.1x Functions······························································································1-12 Timer and Maximum User Number Configuration·········································································1-14 Advanced 802.1x Configuration············································································································1-15 Configuring Proxy Checking··········································································································1-15 Configuring Client Version Checking·····························································································1-16 Enabling DHCP-triggeredAuthentication······················································································1-17 Configuring Guest VLAN ···············································································································1-17 Configuring 802.1x Re-Authentication···························································································1-18 Configuring the 802.1x Re-Authentication Timer ··········································································1-18 Displaying and Maintaining 802.1x ·······································································································1-19 Configuration Example··························································································································1-19 802.1x Configuration Example ······································································································1-19

2Quick EAD Deployment Configuration····································································································2-1Introduction to Quick EAD Deployment ··································································································2-1 Quick EAD Deployment Overview···································································································2-1 Operation of Quick EAD Deployment······························································································2-1 Configuring Quick EAD Deployment·······································································································2-1 Configuration Prerequisites ·············································································································2-1 Configuration Procedure··················································································································2-2 Displaying and Maintaining Quick EAD Deployment ······································································2-3 Quick EAD Deployment Configuration Example·····················································································2-3 Troubleshooting ······································································································································2-4

3System-Guard Configuration ···················································································································3-1System-GuardOverview·························································································································3-1 Configuring the System-GuardFeature··································································································3-1 Configuring the System-Guard Feature ··························································································3-1 Displaying and Maintaining System-Guard·····························································································3-2

i

Page 221
Image 221
3Com WX3000 operation manual Table of Contents