3Com Switch 8800 Advanced Software V5 Configuration Guide

71
802.1X CONFIGURATION
When configuring 802.1x, go to these sections for information you are interested
in:
“802.1x Overview” on page 917
“Configuring 802.1x” on page 926
“Configuring a Guest VLAN” on page 928
“Displaying and Maintaining 802.1x” on page 929
“802.1x Configuration Example” on page 929
“Guest VLAN Configuration Example” on page 932
802.1x Overview The 802.1x protocol was proposed by IEEE802 LAN/WAN committee for security
problems on wireless LANs (WLAN). Currently, it is widely used on Ethernet as a
common port access control mechanism.
As a port-based network access control protocol, 802.1x authenticates and
controls accessing devices at the level of port. A device connected to an
802.1x-enabled port of an access control device can access the resources on the
LAN only after passing authentication. A device failing the authentication is
logically disconnected.
To get more information about 802.1x, go to these topics:
“Architecture of 802.1x” on page 917
“Operation of 802.1x” on page 919
“EAP Encapsulation over LANs” on page 919
“EAP Encapsulation over RADIUS” on page 921
“Authentication Process of 802.1x” on page 921
“802.1x Timers” on page 924
“Implementation of 802.1x in the Devices” on page 925
“Features Working Together with 802.1x” on page 925
Architecture of 802.1x 802.1x operates in the typical client/server model and defines three entities:
supplicant system, authenticator system, and authentication server system, as
shown in
Figure 265.