Configuring IGMP Snooping........................................................................................................ 27-16
Configuring Multicast VLAN ........................................................................................................ 27-18
Troubleshooting IGMP Snooping........................................................................................................ 27-20
28
802.1x Configuration.............................................................................................................................. 28-1
Introduction to 802.1x............................................................................................................................ 28-1
Architecture of 802.1x Authentication............................................................................................ 28-1
The Mechanism of an 802.1x Authentication System ................................................................... 28-3
Encapsulation of EAPoL Messages .............................................................................................. 28-3
802.1x Authentication Procedure .................................................................................................. 28-5
Timers Used in 802.1x................................................................................................................... 28-8
802.1x Implementation on a 3Com 4500 Series Switch ............................................................... 28-9
Introduction to 802.1x Configuration ................................................................................................... 28-12
Basic 802.1x Configuration ................................................................................................................. 28-13
Configuration Prerequisites ......................................................................................................... 28-13
Configuring Basic 802.1x Functions............................................................................................ 28-13
Timer and Maximum User Number Configuration....................................................................... 28-14
Advanced 802.1x Configuration.......................................................................................................... 28-15
Configuring Proxy Checking ........................................................................................................ 28-16
Configuring Client Version Checking........................................................................................... 28-16
Enabling DHCP-triggered Authentication .................................................................................... 28-17
Configuring Guest VLAN ............................................................................................................. 28-17
Configuring 802.1x Re-Authentication......................................................................................... 28-18
Configuring the 802.1x Re-Authentication Timer ........................................................................ 28-18
Displaying and Maintaining 802.1x Configuration............................................................................... 28-19
Configuration Example........................................................................................................................ 28-19
802.1x Configuration Example .................................................................................................... 28-19
29
Quick EAD Deployment Configuration ................................................................................................ 29-1
Introduction to Quick EAD Deployment ................................................................................................ 29-1
Quick EAD Deployment Overview................................................................................................. 29-1
Operation of Quick EAD Deployment............................................................................................ 29-1
Configuring Quick EAD Deployment..................................................................................................... 29-2
Configuration Prerequisites ........................................................................................................... 29-2
Configuration Procedure................................................................................................................ 29-2
Displaying and Maintaining Quick EAD Deployment .................................................................... 29-3
Quick EAD Deployment Configuration Example................................................................................... 29-3
Troubleshooting .................................................................................................................................... 29-5
30
HABP Configuration .............................................................................................................................. 30-1
Introduction to HABP............................................................................................................................. 30-1
HABP Server Configuration .................................................................................................................. 30-1
HABP Client Configuration.................................................................................................................... 30-2
Displaying and Maintaining HABP Configuration.................................................................................. 30-2
31
System Guard Configuration ................................................................................................................ 31-1
System Guard Overview ....................................................................................................................... 31-1
Guard Against IP Attacks .............................................................................................................. 31-1
Guard Against TCN Attacks .......................................................................................................... 31-1
Layer 3 Error Control ..................................................................................................................... 31-1
CPU Protection.............................................................................................................................. 31-1
x