1-1
1
802.1X Configuration
When configuring 802.1X, go to these sections for information you are interested in:
z
802.1X Overview
z
802.1X Configuration Task List
z
802.1X Configuration Example
z
Guest VLAN and VLAN Assignment Configuration Example
z
ACL Assignment Configuration Example
802.1X Overview
The 802.1X protocol was proposed by IEEE 802 LAN/WAN committee for security of wireless LANs
(WLAN). It has been widely used on Ethernet as a common port access control mechanism.
As a port-based network access control protocol, 802.1X is used to perform port-level authentication
and control of devices connected to the 802.1X-enabled LAN ports. With the 802.1X protocol employed,
a user-side device can access the LAN only when it passes the authentication. Those devices that fail
to pass the authentication are denied access to the LAN.
The port security feature provides rich security modes that combine or extend 802.1X and MAC
address authentication. In a networking environment that requires flexible use of 802.1X and MAC
address authentication, you are recommended to configure the port security feature. In a network
environment that requires only 802.1X authentication, you are recommended to configure the 802.1X
directly rather than configure the port security feature for simplicity sake. For how to use the port
security feature, refer to
Port Security Configuration
in the
Security Volume
.
To get more information about 802.1X, go to these topics:
z
Architecture of 802.1X
z
Authentication Modes of 802.1X
z
Basic Concepts of 802.1X
z
EAP over LAN
z
EAP over RADIUS
z
802.1X Authentication Triggering
z
Authentication Process of 802.1X
z
802.1X Access Control Method
z
802.1X Timers
z
Features Working Together with 802.1X
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...