
ii
A comparison of EAP relay and EAP termination······························································································ 72
EAP relay································································································································································ 72
EAP termination ····················································································································································· 75
Configuring 802.1X ··················································································································································76
H3C implementation of 802.1X··································································································································· 76
Access control methods ········································································································································ 76
Using 802.1X authentication with other features ······························································································ 76
Configuration prerequisites··········································································································································· 81
802.1X configuration task list······································································································································· 82
Enabling 802.1X···························································································································································· 82
Configuration guidelines ······································································································································ 82
Configuration procedure ······································································································································ 83
Enabling EAP relay or EAP termination ······················································································································· 83
Setting the port authorization state ······························································································································ 84
Specifying an access control method ·························································································································· 84
Setting the maximum number of concurrent 802.1X users on a port······································································· 85
Setting the maximum number of authentication request attempts ············································································· 85
Setting the 802.1X authentication timeout timers······································································································· 86
Configuring the online user handshake function ········································································································ 86
Configuration guidelines ······································································································································ 86
Configuration procedure ······································································································································ 87
Configuring the authentication trigger function ·········································································································· 87
Configuration guidelines ······································································································································ 87
Configuration procedure ······································································································································ 88
Specifying a mandatory authentication domain on a port························································································ 88
Configuring the quiet timer ··········································································································································· 88
Enabling the periodic online user re-authentication function····················································································· 89
Configuration guidelines ······································································································································ 89
Configuration procedure ······································································································································ 89
Configuring a port to send EAPOL frames untagged································································································· 90
Setting the maximum number of 802.1X authentication attempts for MAC authentication users························· 90
Configuring a VLAN group··········································································································································· 90
Configuring an 802.1X guest VLAN ··························································································································· 91
Configuration guidelines ······································································································································ 91
Configuration prerequisites ·································································································································· 91
Configuration procedure ······································································································································ 92
Configuring an 802.1X Auth-Fail VLAN······················································································································ 92
Configuration guidelines ······································································································································ 92
Configuration prerequisites ·································································································································· 93
Configuration procedure ······································································································································ 93
Configuring an 802.1X critical VLAN ························································································································· 93
Configuration guidelines ······································································································································ 93
Configuration prerequisites ·································································································································· 93
Configuration procedure ······································································································································ 94
Specifying supported domain name delimiters··········································································································· 94
Displaying and maintaining 802.1X ··························································································································· 95
802.1X authentication configuration example ··········································································································· 95
Network requirements··········································································································································· 95
Configuration procedure ······································································································································ 95
Verifying the configuration··································································································································· 97
802.1X with guest VLAN and VLAN assignment configuration example ······························································· 97
Network requirements··········································································································································· 97
Configuration procedure ······································································································································ 98
Verifying the configuration··································································································································· 99