544 CHAPTER 50: EAD C ONFIGURATIONsoftware and install system patches. Figure 137 shows the typical networkapplication of EAD.Figure 137 Typical network application of EADThe security client (software installed on PC) checks the security status of a clientthat just passes the authentication, and interacts with the security policy server. Ifthe client is not compliant with the security standard, the security policy serverissues ACL control packets to the switch to control which addresses the client canaccess.After the client is patched and compliant with the required security standard, thesecurity policy server reissues an ACL to the switch to assign the access right to theclient.EAD ConfigurationConfigurationprerequisitesEAD is implemented typically in RADIUS scheme. Before configuring EAD, performthe following configuration:■ Configuring the attributes, such as the user name, user type, and password foraccess users. If local authentication is performed, you need to configure theseattributes on the switch; if remote authentication is performed, you need toconfigure these attributes on AAA sever.■ Configuring RADIUS scheme.■ Associating domain with RADIUS scheme.For the detailed configuration procedure, refer to “AAA & RADIUS & HWTACACSConfiguration” on page 507.Configuring EAD Table 428 EAD configurationOperation Command DescriptionEnter system view system-view -