![HP HP ProCurve Series 6600 Access Security Manual Download Page 633](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101633.webp)
13-21
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
2. Reconfigure Settings for Port-Access
The commands in this section are initially set by default and can be reconfig-
ured as needed.
Syntax:
aaa port-access authenticator <
port-list
>
[control < authorized | auto | unauthorized >]
Controls authentication mode on the specified port:
authorized:
Also termed “Force Authorized”
.
Gives
access to a device connected to the port. In this case,
the device does not have to provide 802.1X credentials
or support 802.1X authentication. (You can still
configure console, Telnet, or SSH security on the port.)
auto
(the default):
The device connected to the port must
support 802.1X authentication and provide valid
credentials to get network access. (Optional: You can
use the Open VLAN mode to provide a path for clients
without 802.1X supplicant software to down-load this
software and begin the authentication process. Refer
to “802.1X Open VLAN Mode” on page 13-32.)
unauthorized:
Also termed
“Force Unauthorized”
.
Do not
grant access to the network, regardless of whether the
device provides the correct credentials and has 802.1X
support.
In this state, the port blocks access to any
connected device.
— Continued on Next Page—
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......