13-44
Configuring Port-Based and User-Based Access Control (802.1X)
802.1X Open VLAN Mode
Note that as an alternative, you can configure the switch to use local
password authentication instead of RADIUS authentication. However,
this is less desirable because it means that all clients use the same
passwords and have the same access privileges. Also, you must use 802.1X
supplicant software that supports the use of local switch passwords.
C a u t i o n
Ensure that you do not introduce a security risk by allowing Unauthorized-
Client VLAN access to network services or resources that could be compro-
mised by an unauthorized client.
Configuring General 802.1X Operation:
These steps enable 802.1X
authentication, and must be done before configuring 802.1X VLAN operation.
1.
Enable 802.1X authentication on the individual ports you want to serve
as authenticators. (The switch automatically disables LACP on the ports
on which you enable 802.1X.) On the ports you will use as authenticators
with VLAN operation, ensure that the port-control parameter is set to
auto
(the default). (Refer to “1. Enable 802.1X Authentication on Selected
Ports” on page 13-18.) This setting requires a client to support 802.1X
authentication (with 802.1X supplicant operation) and to provide valid
credentials to get network access.
2.
Configure the 802.1X authentication type. Options include:
Syntax:
aaa port-access authenticator <
port-list
> control auto
Activates 802.1X port-access on ports you have config-
ured as authenticators.
Syntax:
aaa authentication port-access < local | eap-radius | chap-radius >
Determines the type of RADIUS authentication to use.
local
:
Use the switch’s local username and password
for supplicant authentication (the default).
eap-radius
Use EAP-RADIUS authentication. (Refer
to the documentation for your RADIUS server.
chap-radius
Use CHAP-RADIUS (MD5)
authentication. (Refer to the documentation for
your RADIUS server software.)
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......