13-37
Configuring Port-Based and User-Based Access Control (802.1X)
802.1X Open VLAN Mode
Open VLAN Mode with
Only
an
Unauthorized-Client VLAN
Configured:
• When the port detects a client, it automatically becomes an
untagged member of this VLAN. To limit security risks, the network
services and access available on this VLAN should include only
what a client needs to enable an authentication session. If the port
is statically configured as an untagged member of another VLAN,
the switch temporarily removes the port from membership in this
other VLAN while membership in the Unauthorized-Client VLAN
exists.
• After the client is authenticated, and if the port is statically
configured as an untagged member of another VLAN, the port’s
access to this other VLAN is restored.
Note:
If RADIUS authentication assigns the port to a VLAN, this
assignment overrides any statically configured, untagged VLAN
membership on the port (while the client is connected).
• If the port is statically configured as a tagged member of a VLAN,
the port returns to tagged membership in this VLAN upon
successful client authentication. This happens even if the RADIUS
server assigns the port to another, authorized VLAN. Note that if
the port is already configured as a tagged member of a VLAN that
RADIUS assigns as an authorized VLAN, then the port becomes
an
untagged
member of that VLAN for the duration of the client
connection.
Note for a Port Configured To Allow Multiple Client Sessions:
If any
previously authenticated clients are using a port assigned to a VLAN
other than the Unauthorized-Client VLAN (such as a RADIUS-
assigned VLAN), then a later client that is not running 802.1X
supplicant software is blocked on the port until all other,
authenticated clients on the port have disconnected. Refer to figure
13-1 on page 13-10.
802.1X Per-Port Configuration
Port Response
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......