H3C S7500E Series Ethernet Switches Operation Manual

Operation Manual – 802.1x - MAC Authentication
H3C S7500E Series Ethernet Switches Table of Contents
i
Table of Contents
Chapter 1 802.1x Configuration ................................................................................................... 1-1
1.1 802.1x Overview ................................................................................................................ 1-1
1.1.1 Architecture of 802.1x ............................................................................................. 1-1
1.1.2 Operation of 802.1x................................................................................................. 1-3
1.1.3 EAP Encapsulation over LANs................................................................................ 1-4
1.1.4 EAP Encapsulation over RADIUS........................................................................... 1-5
1.1.5 Authentication Process of 802.1x............................................................................ 1-6
1.1.6 802.1x Timers........................................................................................................ 1-10
1.1.7 Implementation of 802.1x in the Devices .............................................................. 1-10
1.1.8 Features Working Together with 802.1x ............................................................... 1-11
1.2 Configuring 802.1x........................................................................................................... 1-13
1.2.1 Configuration Prerequisites................................................................................... 1-13
1.2.2 Configuring 802.1x Globally .................................................................................. 1-13
1.2.3 Configuring 802.1x for a Port ................................................................................ 1-15
1.3 Configuring a Guest VLAN .............................................................................................. 1-16
1.3.1 Configuration Prerequisites................................................................................... 1-16
1.3.2 Configuration Procedure ....................................................................................... 1-16
1.4 Displaying and Maintaining 802.1x.................................................................................. 1-17
1.5 802.1x Configuration Example......................................................................................... 1-17
1.6 Guest VLAN Configuration Example ............................................................................... 1-20
1.7 ACL Assigning Configuration Example............................................................................ 1-23
Chapter 2 EAD Fast Deployment Configuration ........................................................................ 2-1
2.1 EAD Fast Deployment Overview ....................................................................................... 2-1
2.2 Configuring EAD Fast Deployment.................................................................................... 2-1
2.2.1 Configuration Prerequisites..................................................................................... 2-1
2.2.2 Configuration Procedure ......................................................................................... 2-2
2.3 Displaying and Maintaining EAD Fast Deployment........................................................... 2-3
2.4 EAD Fast Deployment Configuration Example.................................................................. 2-3
2.5 Troubleshooting EAD Fast Deployment ............................................................................ 2-5
2.5.1 Users Cannot be Redirected Correctly ................................................................... 2-5
Chapter 3 MAC Authentication Configuration............................................................................ 3-1
3.1 MAC Authentication Overview........................................................................................... 3-1
3.1.1 RADIUS-Based MAC Authentication ...................................................................... 3-1
3.1.2 Local MAC Authentication....................................................................................... 3-2
3.2 Related Concepts .............................................................................................................. 3-2
3.2.1 MAC Authentication Timers .................................................................................... 3-2
3.2.2 Quiet MAC Address ................................................................................................ 3-2