2-1
2
802.1X-Based EAD Fast Deployment Configuration
When configuring EAD fast deployment, go to these sections for information you are interested in:
z
EAD Fast Deployment Overview
z
Configuring EAD Fast Deployment
z
Displaying and Maintaining EAD Fast Deployment
z
EAD Fast Deployment Configuration Example
z
Troubleshooting EAD Fast Deployment
EAD Fast Deployment Overview
Endpoint Admission Defense (EAD) is an integrated endpoint access control solution. By allowing the
security clients, access devices, security policy servers, and third-party servers in the network to
collaborate with each other, it can improve the overall defense capability of a network and implement
centralized management of users.
Normally, to use EAD on your network, you need to manually deploy the EAD client on each device,
which tends to be time consuming and inefficient. To address the issue, quick EAD deployment was
developed. In conjunction with 802.1X, it can have an access switch to force all attached devices to
download and install the EAD client before permitting them to access the network.
EAD Fast Deployment Implementation
To support the fast deployment of EAD schemes, 802.1X provides the following two mechanisms:
1) Limit on accessible network resources
Before successful 802.1X authentication, a user can access only a specific IP segment, which may
have one or more servers. Users can download EAD client software or obtain dynamic IP address from
the servers.
2) URL
redirection
Before successful 802.1X authentication, a user using a Web browser to access the network is
automatically redirected to a specified URL, for example, the EAD client software download page. The
server that provides the URL redirection must be in the specific network segment that users can access
before passing 802.1X authentication.
Configuring EAD Fast Deployment
Содержание S7902E
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45 ...
Страница 598: ...ii ...
Страница 1757: ...4 9 ...
Страница 1770: ...6 4 ...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface ...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20 ...