Installation manual

Operation Manual - Security
Quidway S3000-EI Series Ethernet Switches Chapter 1
802.1x Configuration
Huawei Technologies Proprietary
1-7
DIUS server must support
CHAP authenticat authentication (switch send authentication
information to RADIUS server in the form of EAP packets directly and RADIUS server
m
F d EAP-MD5 methods are available on the
s
z : The client and RADIUS server check in EAP-TLS approach mutually
the security certificate authority of the other’s, to guarantee the validity of the
certificates and prevent data from being illegally used.
provide integrity protection,
sh identity
ation method for 802.1x user
must support PAP authentication), CHAP authentication (RA
ion), EAP relay
ust support EAP authentication).
or EAP authentication, PEAP, EAP-TLS an
witch:
EAP-TLS
z PEAP: As a kind of EAP protocol, protected EAP (PEAP) first establishes an
encrypted transport layer security (TLS) channel to
and then initiates a new type of EAP negotiation, to accompli
authentication to the client.
If you want to enable PEAP, EAP-TLS or EAP-MD5 authentication method on an
Ethernet switch, you only need to use the command dot1x authentication-method
eap to enable EAP authentication.
Perform the following configurations in system view.
Table 1-7 Configuring the authentic
Operation Command
Configure authentication method for
802.1x
{ |
user
dot1x authentication-method chap
pap | eap }
R store the default authentication
thod for 802.1x user
undo dot1x authentication-method
e
me
By d
1.2.8 Enablin N
enticated for maximum times, the switch adds this
s performed when the user
of the Guest VLAN visits the resources within this Guest VLAN. However, if the user
, the requirements of
allowing unauth ers to access some resources ch as, the user
accesses some re alling 802.1x client, or the user upgrades 802.1x
c
P view or Ethernet port view.
efault, CHAP authentication is used for 802.1x user authentication.
g/Disabling Guest VLA
After the Guest VLAN function is enabled, the switch broadcasts active authentication
packets to all ports on which 802.1x are enabled. If there is still some ports do not return
response packets after being re-auth
ports into Guest VLAN. After that, no 802.1x authentication i
visits the outer resources, authentication is still needed. In this way
enticated us
sources without inst
are met, su
lient without authentication, and so on.
erform the following configuration in system