iTable of Contents1 802.1x Configuration ·································································································································1-1Introduction to 802.1x······························································································································1-1Architecture of 802.1x Authentication······························································································1-1The Mechanism of an 802.1x Authentication System ·····································································1-3Encapsulation of EAPoL Messages ································································································1-3802.1x Authentication Procedure ····································································································1-5Timers Used in 802.1x·····················································································································1-8Additional 802.1x Features Implemented························································································1-9Introduction to 802.1x Configuration ·····································································································1-11Basic 802.1x Configuration ···················································································································1-12Configuration Prerequisites ···········································································································1-12Configuring Basic 802.1x Functions······························································································1-12Timer and Maximum User Number Configuration·········································································1-14Advanced 802.1x Configuration············································································································1-15Configuring Proxy Checking··········································································································1-15Configuring Client Version Checking·····························································································1-16Enabling DHCP-triggered Authentication ······················································································1-17Configuring Guest VLAN ···············································································································1-17Configuring 802.1x Re-Authentication···························································································1-18Configuring the 802.1x Re-Authentication Timer ··········································································1-18Displaying and Maintaining 802.1x ·······································································································1-19Configuration Example··························································································································1-19802.1x Configuration Example ······································································································1-192 Quick EAD Deployment Configuration····································································································2-1Introduction to Quick EAD Deployment ··································································································2-1Quick EAD Deployment Overview···································································································2-1Operation of Quick EAD Deployment······························································································2-1Configuring Quick EAD Deployment·······································································································2-1Configuration Prerequisites ·············································································································2-1Configuration Procedure··················································································································2-2Displaying and Maintaining Quick EAD Deployment ······································································2-3Quick EAD Deployment Configuration Example·····················································································2-3Troubleshooting ······································································································································2-43 System-Guard Configuration ···················································································································3-1System-Guard Overview ·························································································································3-1Configuring the System-Guard Feature ··································································································3-1Configuring the System-Guard Feature ··························································································3-1Displaying and Maintaining System-Guard·····························································································3-2