Configuring Network Login
ExtremeWare XOS 11.3 Concepts Guide
349
NOTE
If you use 802.1x network login, authenticated clients remain authenticated during failover; however, shortly after
failover, all authenticated clients automatically re-authenticate themselves. Re-authentication occurs without user
intervention.
If failover occurs during the authentication or re-authentication of a client, the client must repeat the
authentication process.
To initiate hitless MSM failover on a network that uses network login:
1
Confirm that the MSMs are synchronized and have identical software and switch configurations
using the
show switch {detail}
command. The output displays the status of the MSMs, with the
primary MSM showing
MASTER
and the backup MSM showing
BACKUP (InSync)
.
If the MSMs are not synchronized, proceed to step
2
.
If the MSMs are synchronized, proceed to step
3
.
2
If the MSMs are not in sync, replicate all saved images and configurations from the primary to the
backup using the
synchronize
command.
3
Initiate failover using the
run msm-failover
command.
For more detailed information about verifying the status of the MSMs and system redundancy, see
“Understanding System Redundancy with Dual MSMs Installed—Modular Switches Only” on page 70
.
For more information about hitless failover, see
“Understanding Hitless Failover Support—Modular
Switches Only” on page 74
.
Configuring Network Login
This section provides a general overview of the commands used for:
●
Enabling or Disabling Network Login on the Switch on page 350
●
Enabling or Disabling Network Login on a Specific Port on page 350
●
Configuring the Move Fail Action on page 350
●
Displaying Network Login Settings on page 350
This section also contains information about the
Exclusions and Limitations
of network login.
For more detailed information about a specific mode of network login, including configuration
examples, please refer to the following sections:
●
802.1x Authentication on page 359
●
Web-Based Authentication on page 363
●
MAC-Based Authentication on page 368
Summary of Contents for ExtremeWare XOS 11.3
Page 20: ...Contents ExtremeWare XOS 11 3 Concepts Guide 20...
Page 25: ...1 Using ExtremeWare XOS...
Page 26: ......
Page 38: ...ExtremeWare XOS Overview ExtremeWare XOS 11 3 Concepts Guide 38...
Page 58: ...Accessing the Switch ExtremeWare XOS 11 3 Concepts Guide 58...
Page 146: ...Configuring Slots and Ports on a Switch ExtremeWare XOS 11 3 Concepts Guide 146...
Page 218: ...Status Monitoring and Statistics ExtremeWare XOS 11 3 Concepts Guide 218...
Page 240: ...Virtual LANs ExtremeWare XOS 11 3 Concepts Guide 240...
Page 248: ...Virtual Routers ExtremeWare XOS 11 3 Concepts Guide 248...
Page 278: ...Access Lists ACLs ExtremeWare XOS 11 3 Concepts Guide 278...
Page 288: ...Routing Policies ExtremeWare XOS 11 3 Concepts Guide 288 entry deny_rest if then deny...
Page 344: ...Security ExtremeWare XOS 11 3 Concepts Guide 344...
Page 393: ...2 Using Switching and Routing Protocols...
Page 394: ......
Page 454: ...Spanning Tree Protocol ExtremeWare XOS 11 3 Concepts Guide 454...
Page 484: ...Extreme Standby Router Protocol ExtremeWare XOS 11 3 Concepts Guide 484...
Page 514: ...IPv4 Unicast Routing ExtremeWare XOS 11 3 Concepts Guide 514...
Page 530: ...IPv6 Unicast Routing ExtremeWare XOS 11 3 Concepts Guide 530...
Page 538: ...RIP ExtremeWare XOS 11 3 Concepts Guide 538...
Page 556: ...OSPF ExtremeWare XOS 11 3 Concepts Guide 556...
Page 566: ...OSPFv3 ExtremeWare XOS 11 3 Concepts Guide 566...
Page 589: ...3 Appendixes...
Page 590: ......
Page 640: ...CNA Agent ExtremeWare XOS 11 3 Concepts Guide 640...
Page 670: ...Glossary ExtremeWare XOS 11 3 Concepts Guide 670...
Page 698: ...Index ExtremeWare XOS 11 3 Concepts Guide 698...