4-9
Web and MAC Authentication
Terminology
Terminology
Authorized-Client VLAN:
Like the Unauthorized-Client VLAN, this is a
conventional, static, untagged, port-based VLAN previously configured on
the switch by the System Administrator. The intent in using this VLAN is
to provide authenticated clients with network access and services. When
the client connection terminates, the port drops its membership in this
VLAN.
Authentication Server:
The entity providing an authentication service to
the switch. In the case of a HP Switch E3800 running Web/MAC-Authen-
tication, this is a RADIUS server.
Authenticator:
In HP switch applications, a device such as a HP Switch
E3800 that requires a client or device to provide the proper credentials
(MAC address, or username and password) before being allowed access
to the network.
CHAP:
Challenge Handshake Authentication Protocol. Also known as
“CHAP-RADIUS”.
Client:
In this application, an end-node device such as a management station,
workstation, or mobile PC linked to the switch through a point-to-point
LAN link.
Redirect URL:
A System Administrator-specified web page presented to an
authorized client following Web Authentication. HP recommends speci-
fying this URL when configuring Web Authentication on a switch. Refer
to
aaa port-access web-based [e] <
port-list
> [redirect-url <
url
>]
on page 4-25.
Static VLAN:
A VLAN that has been configured as “permanent” on the switch
by using the CLI
vlan <
vid
>
command or the Menu interface.
Unauthorized-Client VLAN:
A conventional, static, untagged, port-based
VLAN previously configured on the switch by the System Administrator.
It is used to provide limited network access and services to clients who
are not authenticated.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......