13-58
Configuring Port-Based and User-Based Access Control (802.1X)
Displaying 802.1X Configuration, Statistics, and Counters
Figure 13-12.Example of show port-access authenticator config Command
Table 13-2. Field Descriptions of show port-access authenticator config Command Output (Figure 13-12)
Field
Description
Port-access
authenticator activated
Whether 802.1X authentication is enabled or disabled on specified port(s).
Port
Port number on switch.
Re-auth Period
Period of time (in seconds) after which clients connected to the port need to be re-
authenticated.
Access Control
Port’s authentication mode:
Auto:
Network access is allowed to any connected device that supports 802.1X
authentication and provides valid 802.1X credentials.
Authorized:
Network access is allowed to any device connected to the port, regardless of
whether it meets 802.1X criteria.
Unauthorized:
Network access is blocked to any device connected to the port, regardless of
whether the device meets 802.1X criteria.
Max reqs
Number of authentication attempts that must time-out before authentication fails and the
authentication session ends.
Quiet Period
Period of time (in seconds) during which the port does not try to acquire a supplicant.
TX Timeout
Period of time (in seconds) that the port waits to retransmit the next EAPOL PDU during an
authentication session.
Supplicant Timeout
Period of time (in seconds) that the switch waits for a supplicant response to an EAP request.
Server Timeout
Period of time (in seconds) that the switch waits for a server response to an authentication
request.
Cntrl Dir
Directions in which flow of incoming and outgoing traffic is blocked on 802.1X-aware port
that has not yet entered the authenticated state:
Both:
Incoming and outgoing traffic is blocked on port until authentication occurs.
In:
Only incoming traffic is blocked on port before authentication occurs. Outgoing traffic with
unknown destination addresses is flooded on the unauthenticated 802.1X-aware port.
HP Switch(config)# show port-access authenticator config
Port Access Authenticator Configuration
Port-access authenticator activated [No] : Yes
Allow RADIUS-assigned dynamic (GVRP) VLANs [No] : No
| Re-auth Access Max Quiet TX Supplicant Server Cntrl
Port | Period Control Reqs Period Timeout Timeout Timeout Dir
---- + ------- -------- ----- ------- -------- ---------- -------- -----
1 | No Auto 2 60 30 30 30 both
2 | No Auto 2 60 30 30 30 in
...
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......