iTable of Contents1 802.1x Configuration ···································································································· 1-1Introduction to 802.1x ································································································· 1-1Architecture of 802.1x Authentication ···································································· 1-1The Mechanism of an 802.1x Authentication System ·············································· 1-3Encapsulation of EAPoL Messages ······································································· 1-4802.1x Authentication Procedure··········································································· 1-6Timers Used in 802.1x ·························································································· 1-9802.1x Implementation on an S5100-SI/EI Series Switch ····································· 1-10Introduction to 802.1x Configuration ·········································································· 1-13Basic 802.1x Configuration ······················································································· 1-14Configuration Prerequisites ················································································ 1-14Configuring Basic 802.1x Functions ···································································· 1-14Timer and Maximum User Number Configuration ················································· 1-16Advanced 802.1x Configuration ················································································· 1-17Configuring Proxy Checking ················································································ 1-17Configuring Client Version Checking ··································································· 1-18Enabling DHCP-triggered Authentication ····························································· 1-19Configuring Guest VLAN ····················································································· 1-19Configuring 802.1x Re-Authentication ································································· 1-20Configuring the 802.1x Re-Authentication Timer ·················································· 1-20Displaying and Maintaining 802.1x Configuration ······················································· 1-21Configuration Example ······························································································ 1-21802.1x Configuration Example ············································································ 1-212 Quick EAD Deployment Configuration ········································································· 2-1Introduction to Quick EAD Deployment ········································································ 2-1Quick EAD Deployment Overview ········································································· 2-1Operation of Quick EAD Deployment ····································································· 2-1Configuring Quick EAD Deployment ············································································ 2-2Configuration Prerequisites ·················································································· 2-2Configuration Procedure ······················································································· 2-2Displaying and Maintaining Quick EAD Deployment ··············································· 2-4Quick EAD Deployment Configuration Example···························································· 2-4Troubleshooting·········································································································· 2-53 HABP Configuration ····································································································· 3-1Introduction to HABP ·································································································· 3-1HABP Server Configuration ························································································· 3-1HABP Client Configuration ·························································································· 3-2Displaying and Maintaining HABP Configuration ·························································· 3-24 System-Guard Configuration ······················································································· 4-1System-Guard Overview ····························································································· 4-1