28
802.1x Configuration
Wh n configuring 802.1x, go to these sec
e
tions for information you are interested in:
z
Introduction to 802.1x
z
Introduction to 802.1x Configuration
z
Basic 802.1x Configuration
z
Advanced 802.1x Configuration
Displaying and Maintaining 802.1x Configuration
z
z
Configuration Example
Intro
N/WAN committee to address
ess devices. With the 802.1x protocol employed,
LAN only when it passes the authentication. Those fail to pass the
duction to 802.1x
The 802.1x protocol (802.1x for short) was developed by IEEE802 LA
security issues of wireless LANs. It was then used in Ethernet as a common access control mechanism
for LAN ports to address mainly authentication and security problems.
802.1x is a port-based network access control protocol. It authenticates and controls devices
requesting for access in terms of the ports of LAN acc
a user-side device can access the
authentication are denied when accessing the LAN.
This section covers these topics:
z
Architecture of 802.1x Authentication
entication System
z
The Mechanism of an 802.1x Auth
Messages
z
Encapsulation of EAPoL
z
802.1x Authentication Procedure
z
Timers Used in 802.1x
00 Series Switch
z
802.1x Implementation on a 3Com 45
Architecture of 802.1x Authentication
As shown in
Figure 28-1
, 802.1x adopts a client/server architecture with three entities: a supplicant
system, an authenticator system, and an authentication server system.
28-1