H3c-technologies H3C S5120 Series Switches User Manual Page 379

  • Download
  • Add to my manuals
  • Print
  • Page
    / 745
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 378
1-1
1 802.1X Configuration
This chapter includes these sections:
z 802.1X Overview
z 802.1X Configuration Task List
z 802.1X Configuration Example
z Guest VLAN and VLAN Assignment Configuration Example
z ACL Assignment Configuration Example
802.1X Overview
The 802.1X protocol was proposed by IEEE 802 LAN/WAN committee for security of wireless LANs
(WLANs). However, it has been widely used on Ethernet as a common port access control mechanism.
As a port-based network access control protocol, 802.1X authenticates devices connected to the
802.1X-enabled LAN ports to control their access to the LAN.
To get more information about 802.1X, go to these topics:
z Architecture of 802.1X
z Authentication Modes of 802.1X
z Basic Concepts of 802.1X
z EAP over LAN
z EAP over RADIUS
z 802.1X Authentication Triggering
z Authentication Process of 802.1X
z 802.1X Access Control Method
z Features Working Together with 802.1X
Architecture of 802.1X
802.1X operates in the typical client/server model and defines three entities: Client, Device, and Server,
as shown in Figure 1-1
.
Figure 1-1 Architecture of 802.1X
z Client is an entity seeking access to the LAN. It resides at one end of a LAN segment and is
authenticated by Device at the other end of the LAN segment. Client is usually a user-end device
such as a PC. 802.1X authentication is triggered when an 802.1X-capable client program is
launched on Client. The client program must support Extensible Authentication Protocol over LAN
(EAPOL).
Page view 378
1 2 ... 374 375 376 377 378 379 380 381 382 383 384 ... 744 745

Comments to this Manuals

No comments