2-12 802.1X ConfigurationWhen configuring 802.1X, go to these sections for information you are interested in:z 802.1X Overviewz Configuring 802.1Xz Configuring an 802.1X Port-based Guest VLANz 802.1X Configuration Examplez Guest VLAN and VLAN Assignment Configuration Examplez ACL Assignment Configuration Example802.1X OverviewThe 802.1X protocol was proposed by IEEE802 LAN/WAN committee for security of wireless LANs(WLAN). It has been widely used on Ethernet as a common port access control mechanism.As a port-based access control protocol, 802.1X authenticates and controls accessing devices at theport level. A device connected to an 802.1X-enabled port of an access control device can access theresources on the LAN only after passing authentication.The port security feature provides rich security modes that combine or extend 802.1X and MACaddress authentication. In a networking environment that requires flexible use of 802.1X and MACaddress authentication, you are recommended to configure the port security feature. In a networkenvironment that requires only 802.1X authentication, you are recommended to configure the 802.1Xdirectly rather than configure the port security feature for simplicity sake. For how to use the portsecurity feature, refer to Port Security Configuration in the Security Volume.To get more information about 802.1X, go to these topics:z Architecture of 802.1Xz Basic Concepts of 802.1Xz EAP over LANsz EAP over RADIUSz 802.1X Authentication Triggeringz Authentication Process of 802.1Xz 802.1X Timersz Features Working Together with 802.1XArchitecture of 802.1X802.1X operates in the typical client/server model and defines three entities: client, device, and server,as shown in Figure 2-1.