H3C Technologies H3C WX3000 Series Unified Switches User Manual

Page 12

Advertising
background image

vii

Configuring the Maximum Transmitting Speed on the Current Port ...........................................22-29
Configuring a Port as an Edge Port.............................................................................................22-29
Configuring the Path Cost for a Port ...........................................................................................22-29
Configuring Port Priority ..............................................................................................................22-32
Specifying Whether the Link Connected to a Port Is a Point-to-point Link .................................22-32
Enabling MSTP............................................................................................................................22-33

Performing mCheck Operation ...........................................................................................................22-33

Configuration Prerequisites .........................................................................................................22-33
Configuration Procedure........................................................................................................
......22-33
Configuration Example ..........................................................................................................
......22-33

Configuring Guard Functions ..............................................................................................................22-34

Introduction..................................................................................................................................22-34
Configuration Prerequisites .........................................................................................................22-35
Configuring BPDU Guard .........................................................................................................
...22-35
Configuring Root Guard...............................................................................................................22-36
Configuring Loop Guard .........................................................................................................
.....22-36
Configuring TC-BPDU Attack Guard ...........................................................................................22-37
Configuring BPDU Dropping ......................................................................................................
.22-37

Configuring Digest Snooping ..............................................................................................................22-38

Introduction..................................................................................................................................22-38
Configuring Digest Snooping....................................................................................................
...22-38

Configuring Rapid Transition ..............................................................................................................22-39

Introduction..................................................................................................................................22-39
Configuring Rapid Transition.......................................................................................................22-41

Configuring VLAN-VPN Tunnel...........................................................................................................22-42

Introduction..................................................................................................................................22-42
Configuring VLAN-VPN tunnel ....................................................................................................22-43

STP Maintenance Configuration .........................................................................................................22-43

Introduction..................................................................................................................................22-43
Enabling Log/Trap Output for Ports of MSTP Instance...............................................................22-43
Configuration Example ................................................................................................................22-44

Enabling Trap Messages Conforming to 802.1d Standard.................................................................22-44
Displaying and Maintaining MSTP ................................................................................................
......22-44
MSTP Configuration Example.............................................................................................................22-45
VLAN-VPN tunnel Configuration Example..........................................................................................22-46

23 802.1x Configuration .............................................................................................................................23-1

Introduction to 802.1x............................................................................................................................23-1

Architecture of 802.1x Authentication............................................................................................23-1
The Mechanism of an 802.1x Authentication System ...................................................................23-3
Encapsulation of EAPoL Messages ..............................................................................................23-3
802.1x Authentication Procedure ..................................................................................................23-5
Timers Used in 802.1x...................................................................................................................23-8
Additional 802.1x Features Implemented......................................................................................23-9

Introduction to 802.1x Configuration ...................................................................................................23-12
Basic 802.1x Configuration .................................................................................................................23-13

Advertising