![HP HP ProCurve Series 6600 Access Security Manual Download Page 636](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101636.webp)
13-24
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
3. Configure the 802.1X Authentication Method
This task specifies how the switch authenticates the credentials provided by
a supplicant connected to a switch port configured as an 802.1X authenticator
You can configure
local
,
chap-radius
or
eap-radius
as the primary password
authentication method for the port-access method. You also need to select
none or authorized
as a secondary, or backup, method.
Syntax:
aaa authentication port-access <chap-radius |eap-radius | local>
Configures
local
,
chap-radius (
MD5
)
, or
eap-radius
as the primary
password authentication method for port-access. The default pri-
mary authentication is
local
. (Refer to the documentation for
your RADIUS server application.)
For switches covered in this guide, you must use the
password port-access
command to configure the operator user-
name and password for 802.1X access. See “General Setup Proce-
dure for 802.1X Access Control” on page 13-13 for more
information.
[<none | authorized >]
Provides options for secondary authentication. The
none
option specifies that a backup authentication
method is not used. The
authorized
option allows access
without authentication. (default:
none
).
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......