7-42
Configuring RADIUS Server Support for Switch Services
Configuring and Using Dynamic (RADIUS-Assigned) Access Control Lists
Event Log Messages
Please see the
Event Log Message Reference Guide
for information about
Event Log messages.
Causes of Client Deauthentication Immediately
After Authenticating
■
ACE formatted incorrectly in the RADIUS server
•
“from”, “any”, or “to” keyword missing
•
An IPv4 or IPv6 protocol number in the ACE exceeds 255.
•
An optional UDP or TCP port number is invalid, or a UDP/TCP port
number is specified when the protocol is neither UDP or TCP.
■
A RADIUS-assigned ACL limit has been exceeded.
•
An ACE in the ACL for a given authenticated client exceeds 80
characters.
•
The TCP/UDP port-range quantity of 14 per slot or port group has been
exceeded.
•
The rule limit of 3048 per slot or port group has been exceeded.
■
An IPv6 ACE has been received on a port and either the
HP-Nas-Rules-
IPv6
attribute is missing or
HP-Nas-Rules-IPv6=2
is configured. Refer to
table 7-7 on page 7-23 for more on this attribute.
Monitoring Shared Resources
Currently active, RADIUS-based authentication sessions (including HP IDM
client sessions) using RADIUS-assigned ACLs share internal switch resources
with several other features. The switch provides ample resources for all
features. However, if the internal resources do become fully subscribed, new
RADIUS-based sessions using RADIUS-assigned ACLs cannot be authenti-
cated until the necessary resources are released from other applications.
■
For information on determining the current resource availability and
usage, refer to the appendix titled “Monitoring Resources” in the
Management and Configuration Guide
for your switch.
■
For a summary of ACL resource limits, refer to the appendix covering
scalability in the latest
Management and Configuration Guide
for
your switch.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......