iv
Configuring 802.1X ·················································································································································· 71
HP implementation of 802.1X ······································································································································ 71
Access control methods ········································································································································ 71
Using 802.1X authentication with other features ······························································································ 71
Configuration prerequisites ·································································································································· 74
802.1X configuration task list ······························································································································ 74
Enabling 802.1X ··················································································································································· 74
Enabling EAP relay or EAP termination ·············································································································· 75
Setting the port authorization state ······················································································································ 75
Specifying an access control method ·················································································································· 76
Setting the maximum number of concurrent 802.1X users on a port ······························································ 76
Setting the maximum number of authentication request attempts ···································································· 77
Setting the 802.1X authentication timeout timers ······························································································ 77
Configuring the online user handshake function ······························································································· 78
Configuring the authentication trigger function ································································································· 78
Specifying a mandatory authentication domain on a port ··············································································· 79
Configuring the quiet timer ·································································································································· 80
Enabling the periodic online user re-authentication function ············································································ 80
Configuring an 802.1X guest VLAN ··················································································································· 81
Configuring an Auth-Fail VLAN ··························································································································· 82
Specifying supported domain name delimiters ·································································································· 83
Displaying and maintaining 802.1X ··························································································································· 83
802.1X configuration examples ··································································································································· 83
802.1X authentication configuration example ·································································································· 83
802.1X with guest VLAN and VLAN assignment configuration example······················································· 86
802.1X with ACL assignment configuration example ······················································································· 89
Configuring EAD fast deployment ···························································································································· 91
EAD fast deployment implementation ················································································································· 91
Configuration prerequisites ·································································································································· 91
Configuration procedure ······································································································································ 91
Displaying and maintaining EAD fast deployment ····································································································· 92
EAD fast deployment configuration example ·············································································································· 93
Troubleshooting EAD fast deployment ························································································································· 95
Web browser users cannot be correctly redirected ·························································································· 95
Configuring MAC authentication ······························································································································ 96
User account policies ············································································································································ 96
Authentication approaches ·································································································································· 96
MAC authentication timers ··································································································································· 97
Using MAC authentication with other features ··········································································································· 97
VLAN assignment ·················································································································································· 97
ACL assignment ····················································································································································· 97
Guest VLAN ··························································································································································· 97
MAC authentication configuration task list ················································································································· 98
Basic configuration for MAC authentication ··············································································································· 98
Configuration prerequisites ·································································································································· 98
Configuration procedure ······································································································································ 98
Specifying an authentication domain for MAC authentication users ······································································· 99
Configuring a MAC authentication guest VLAN ······································································································ 100
Configuration prerequisites ································································································································ 100
Configuration procedure ···································································································································· 100
Displaying and maintaining MAC authentication ···································································································· 101
MAC authentication configuration examples ············································································································ 101
Local MAC authentication configuration example ·························································································· 101
RADIUS-based MAC authentication configuration example ·········································································· 103
ACL assignment configuration example ··········································································································· 105