13-24
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
3. Configure the 802.1X Authentication Method
This task specifies how the switch authenticates the credentials provided by
a supplicant connected to a switch port configured as an 802.1X authenticator
You can configure
local
,
chap-radius
or
eap-radius
as the primary password
authentication method for the port-access method. You also need to select
none or authorized
as a secondary, or backup, method.
Syntax:
aaa authentication port-access <chap-radius |eap-radius | local>
Configures
local
,
chap-radius (
MD5
)
, or
eap-radius
as the primary
password authentication method for port-access. The default pri-
mary authentication is
local
. (Refer to the documentation for
your RADIUS server application.)
For switches covered in this guide, you must use the
password port-access
command to configure the operator user-
name and password for 802.1X access. See “General Setup Proce-
dure for 802.1X Access Control” on page 13-13 for more
information.
[<none | authorized >]
Provides options for secondary authentication. The
none
option specifies that a backup authentication
method is not used. The
authorized
option allows access
without authentication. (default:
none
).
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......