13-22
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
[quiet-period < 0 - 65535 >]
Sets the period during which the port does not try to
acquire a supplicant. The period begins after the last
attempt authorized by the
max-requests
parameter fails
(next page). (Default: 60 seconds)
[tx-period < 0 - 65535 >]
Sets the period the port waits to retransmit the next
EAPOL PDU during an authentication session.
(Default: 30 seconds)
[supplicant-timeout < 1 - 300 >]
Sets the period of time the switch waits for a supplicant
response to an EAP request. If the supplicant does not
respond within the configured time frame, the session
times out. (Default: 30 seconds)
[server-timeout < 1 - 300 >]
Sets the period of time the switch waits for a server
response to an authentication request. If there is no
response within the configured time frame, the switch
assumes that the authentication attempt has timed
out. Depending on the current
max-requests
setting, the
switch will either send a new request to the server or
end the authentication session. (Default: 30 seconds)
[max-requests < 1 - 10 >]
Sets the number of authentication attempts that must
time-out before authentication fails and the authenti-
cation session ends. If you are using the Local authen-
tication option, or are using RADIUS authentication
with only one host server, the switch will not start
another session until a client tries a new access
attempt. If you are using RADIUS authentication with
two or three host servers, the switch will open a session
with each server, in turn, until authentication occurs
or there are no more servers to try. During the
quiet-
period
(previous page), if any, you cannot reconfigure
this parameter. (Default: 2)
— Continued on Next Page —
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......