
Operation Manual – 802.1x and System Guard
H3C S3100-52P Ethernet switch Table of Contents
i
Table of Contents
Chapter 1 802.1x Configuration...................................................................................................1-1
1.1 Introduction to 802.1x........................................................................................................1-1
1.1.1 Architecture of 802.1x Authentication ..................................................................... 1-2
1.1.2 The Mechanism of an 802.1x Authentication System.............................................1-3
1.1.3 Encapsulation of EAPoL Messages........................................................................1-4
1.1.4 802.1x Authentication Procedure............................................................................1-7
1.1.5 Timers Used in 802.1x..........................................................................................1-10
1.1.6 802.1x Implementation on an S3100-52P Switch.................................................1-11
1.2 Introduction to 802.1x Configuration................................................................................1-15
1.3 Basic 802.1x Configuration..............................................................................................1-16
1.3.1 Configuration Prerequisites...................................................................................1-16
1.3.2 Configuring Basic 802.1x Functions......................................................................1-16
1.3.3 Timer and Maximum User Number Configuration ................................................1-18
1.4 Advanced 802.1x Configuration.......................................................................................1-20
1.4.1 Configuring Proxy Checking..................................................................................1-20
1.4.2 Configuring Client Version Checking ....................................................................1-21
1.4.3 Enabling DHCP-triggered Authentication..............................................................1-22
1.4.4 Configuring Guest VLAN.......................................................................................1-22
1.4.5 Configuring 802.1x Re-Authentication .................................................................. 1-23
1.4.6 Configuring the 802.1x Re-Authentication Timer..................................................1-23
1.5 Displaying and Maintaining 802.1x Configuration ...........................................................1-24
1.6 Configuration Example ....................................................................................................1-24
1.6.1 802.1x Configuration Example..............................................................................1-24
Chapter 2 Quick EAD Deployment Configuration......................................................................2-1
2.1 Introduction to Quick EAD Deployment.............................................................................2-1
2.1.1 Quick EAD Deployment Overview .......................................................................... 2-1
2.1.2 Operation of Quick EAD Deployment......................................................................2-1
2.2 Configuring Quick EAD Deployment..................................................................................2-2
2.2.1 Configuration Prerequisites.....................................................................................2-2
2.2.2 Configuration Procedure.........................................................................................2-2
2.2.3 Displaying and Maintaining Quick EAD Deployment..............................................2-4
2.3 Quick EAD Deployment Configuration Example ...............................................................2-4
2.4 Troubleshooting.................................................................................................................2-5
Chapter 3 HABP Configuration....................................................................................................3-1
3.1 Introduction to HABP .........................................................................................................3-1
3.2 HABP Server Configuration...............................................................................................3-1
3.3 HABP Client Configuration ................................................................................................3-2