13-75
Configuring Port-Based and User-Based Access Control (802.1X)
How RADIUS/802.1X Authentication Affects VLAN Operation
Enabling the Use of GVRP-Learned Dynamic VLANs
in Authentication Sessions
Syntax:
aaa port-access gvrp-vlans
Enables the use of dynamic VLANs (learned through GVRP)
in the temporary untagged VLAN assigned by a RADIUS
server on an authenticated port in an 802.1X, MAC, or Web
authentication session.
Enter the
no
form of this command to disable the use of GVRP-
learned VLANs in an authentication session.
For information on how to enable a switch to dynamically
create 802.1Q-compliant VLANs, see the chapter on “GVRP”
in the Advanced Traffic Management Guide.
Notes
:
1. If a port is assigned as a member of an untagged dynamic
VLAN, the dynamic VLAN configuration must exist at the
time of authentication and GVRP for port-access
authentication must be enabled on the switch.
If the dynamic VLAN does not exist or if you have not enabled
the use of a dynamic VLAN for authentication sessions on
the switch, the authentication fails.
2. After you enable dynamic VLAN assignment in an authen-
tication session, it is recommended that you use the
interface
unknown-vlans
command on a per-port basis to prevent
denial-of-service attacks. The
interface unknown-vlans
c
om-
mand allows you to:
• Disable the port from sending advertisements of existing
GVRP-created VLANs on the switch.
• Drop all GVRP advertisements received on the port.
For more information, refer to the chapter on “GVRP” in the
Advanced Traffic Management Guide.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......