3Com Switch 8800 Advanced Software V5 Configuration Guide
71
802.1X CONFIGURATION
When configuring 802.1x, go to these sections for information you are interested
in:
■ “802.1x Overview” on page 917
■ “Configuring 802.1x” on page 926
■ “Configuring a Guest VLAN” on page 928
■ “Displaying and Maintaining 802.1x” on page 929
■ “802.1x Configuration Example” on page 929
■ “Guest VLAN Configuration Example” on page 932
802.1x Overview The 802.1x protocol was proposed by IEEE802 LAN/WAN committee for security
problems on wireless LANs (WLAN). Currently, it is widely used on Ethernet as a
common port access control mechanism.
As a port-based network access control protocol, 802.1x authenticates and
controls accessing devices at the level of port. A device connected to an
802.1x-enabled port of an access control device can access the resources on the
LAN only after passing authentication. A device failing the authentication is
logically disconnected.
To get more information about 802.1x, go to these topics:
■ “Architecture of 802.1x” on page 917
■ “Operation of 802.1x” on page 919
■ “EAP Encapsulation over LANs” on page 919
■ “EAP Encapsulation over RADIUS” on page 921
■ “Authentication Process of 802.1x” on page 921
■ “802.1x Timers” on page 924
■ “Implementation of 802.1x in the Devices” on page 925
■ “Features Working Together with 802.1x” on page 925
Architecture of 802.1x 802.1x operates in the typical client/server model and defines three entities:
supplicant system, authenticator system, and authentication server system, as
shown in
Figure 265.