13-53
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches
aaa port-access supplicant [ethernet] <
port-list
>
(Syntax Continued)
[secret]
Enter secret:
<
password
>
Repeat secret:
<
password
>
Sets the secret password to be used by the port supplicant
when an MD5 authentication request is received from an
authenticator. The switch prompts you to enter the secret
password after the command is invoked.
[encrypted-secret]
Specify secret as a base64-encoded aes-256 encrypted
string.
[auth-timeout < 1 - 300 >]
Sets the delay period the port waits to receive a challenge
from the authenticator. If the request times out, the port
sends another request, up to the number of attempts spec-
ified by the
max-start
parameter. (Default: 30 seconds).
[max-start < 1 - 10 >]
Defines the maximum number of times the supplicant port
requests authentication. See step 1 on page 13-50 for a
description of how the port reacts to the authenticator
response. (Default: 3).
[held-period < 0 - 65535 >]
Sets the time period the supplicant port waits after an
active 802.1X session fails before trying to re- acquire the
authenticator port. (Default: 60 seconds)
[start-period < 1 - 300 >]
Sets the delay between Start packet retransmissions. That
is, after a supplicant sends a start packet, it waits during
the
start-period
for a response. If no response comes during
the
start- period
, the supplicant sends a new start packet.
The
max-start
setting (above) specifies how many start
attempts are allowed in the session. (Default: 30 seconds)
aaa port-access supplicant [ethernet] <
port-list
>
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......