1-1
1
802.1X Configuration
When configuring 802.1X, go to these sections for information you are interested in:
z
802.1X Overview
z
Configuring 802.1X
z
Configuring an 802.1X Port-based Guest VLAN
z
Displaying and Maintaining 802.1X
z
802.1X Configuration Example
z
Guest VLAN and VLAN Assignment Configuration Example
z
ACL Assignment Configuration Example
802.1X Overview
The 802.1X protocol was proposed by IEEE802 LAN/WAN committee for security of wireless LANs
(WLAN). It has been widely used on Ethernet as a common port access control mechanism.
As a port-based access control protocol, 802.1X authenticates and controls accessing devices at the
port level. A device connected to an 802.1X-enabled port of an access control device can access the
resources on the LAN only after passing authentication.
The port security feature provides rich security modes that combine or extend 802.1X and MAC
address authentication. In a networking environment that requires flexible use of 802.1X and MAC
address authentication, you are recommended to configure the port security feature. In a network
environment that requires only 802.1X authentication, you are recommended to configure the 802.1X
directly rather than configure the port security feature for simplicity sake. For how to use the port
security feature, refer to
Port Security Configuration
in the
Security Volume
.
To get more information about 802.1X, go to these topics:
z
Architecture of 802.1X
z
Basic Concepts of 802.1X
z
EAP over LANs
z
EAP over RADIUS
z
802.1X Authentication Triggering
z
Authentication Process of 802.1X
z
802.1X Timers
z
Features Working Together with 802.1X
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...