5 802.1x configuration, 1x overview, 1x configuration – H3C Technologies H3C S7500E Series Switches User Manual

Page 91

Advertising
background image

5-1

5

802.1X Configuration

This chapter includes these sections:

z

802.1X Overview

z

802.1X Configuration

z

Displaying and Maintaining 802.1X

z

802.1X Configuration Examples

802.1X Overview

The 802.1X protocol was proposed by IEEE 802 LAN/WAN committee for security of wireless

LANs (WLANs). However, it has been widely used on Ethernet as a common port access

control mechanism.

As a port-based network access control protocol, 802.1X authenticates devices connected to

the 802.1X-enabled LAN ports to control their access to the LAN.

The port security feature provides rich security modes that combine or extend 802.1X and MAC

address authentication. In a networking environment that requires flexible use of 802.1X and

MAC address authentication, you are recommended to configure the port security feature. In a

network environment that requires only 802.1X authentication, you are recommended to

configure the 802.1X directly rather than configure the port security feature for simplicity sake.

For how to use the port security feature, see Port Security Configuration in the Security

Configuration Guide.

To get more information about 802.1X, go to these topics:

z

Architecture of 802.1X

z

Authentication Modes of 802.1X

z

Basic Concepts of 802.1X

z

EAP over LAN

z

EAP over RADIUS

z

802.1X Authentication Triggering

z

Authentication Process of 802.1X

z

Features Working Together with 802.1X

Advertising