Configuring IGMP Snooping........................................................................................................ 27-16Configuring Multicast VLAN ........................................................................................................ 27-18Troubleshooting IGMP Snooping........................................................................................................ 27-2028 802.1x Configuration.............................................................................................................................. 28-1Introduction to 802.1x............................................................................................................................ 28-1Architecture of 802.1x Authentication............................................................................................ 28-1The Mechanism of an 802.1x Authentication System ................................................................... 28-3Encapsulation of EAPoL Messages .............................................................................................. 28-3802.1x Authentication Procedure .................................................................................................. 28-5Timers Used in 802.1x................................................................................................................... 28-8802.1x Implementation on a 3Com 4500 Series Switch ............................................................... 28-9Introduction to 802.1x Configuration ................................................................................................... 28-12Basic 802.1x Configuration ................................................................................................................. 28-13Configuration Prerequisites ......................................................................................................... 28-13Configuring Basic 802.1x Functions............................................................................................ 28-13Timer and Maximum User Number Configuration....................................................................... 28-14Advanced 802.1x Configuration.......................................................................................................... 28-15Configuring Proxy Checking........................................................................................................ 28-16Configuring Client Version Checking........................................................................................... 28-16Enabling DHCP-triggered Authentication .................................................................................... 28-17Configuring Guest VLAN ............................................................................................................. 28-17Configuring 802.1x Re-Authentication......................................................................................... 28-18Configuring the 802.1x Re-Authentication Timer ........................................................................ 28-18Displaying and Maintaining 802.1x Configuration............................................................................... 28-19Configuration Example........................................................................................................................ 28-19802.1x Configuration Example .................................................................................................... 28-1929 Quick EAD Deployment Configuration ................................................................................................ 29-1Introduction to Quick EAD Deployment ................................................................................................ 29-1Quick EAD Deployment Overview................................................................................................. 29-1Operation of Quick EAD Deployment............................................................................................ 29-1Configuring Quick EAD Deployment..................................................................................................... 29-2Configuration Prerequisites ........................................................................................................... 29-2Configuration Procedure................................................................................................................ 29-2Displaying and Maintaining Quick EAD Deployment .................................................................... 29-3Quick EAD Deployment Configuration Example................................................................................... 29-3Troubleshooting .................................................................................................................................... 29-530 HABP Configuration .............................................................................................................................. 30-1Introduction to HABP............................................................................................................................. 30-1HABP Server Configuration .................................................................................................................. 30-1HABP Client Configuration.................................................................................................................... 30-2Displaying and Maintaining HABP Configuration.................................................................................. 30-231 System Guard Configuration ................................................................................................................ 31-1System Guard Overview ....................................................................................................................... 31-1Guard Against IP Attacks .............................................................................................................. 31-1Guard Against TCN Attacks .......................................................................................................... 31-1Layer 3 Error Control ..................................................................................................................... 31-1CPU Protection.............................................................................................................................. 31-1x