Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches
Configuring Switch Ports To Operate As
Supplicants for 802.1X Connections to
Other Switches
802.1X Authentication Commands
page 10-16
802.1X Supplicant Commands
[no] aaa port-access < supplicant < [ethernet] <
port-list
>
page 10-44
[auth-timeout | held-period | start-period | max-start | initialize |
page 10-44
identity | secret | clear-statistics]
802.1X-Related Show Commands
page 10-46
RADIUS server configuration
pages 10-22
A switch port can operate as a supplicant in a connection to a port on another
802.1X-aware switch to provide security on links between 802.1X-aware
switches. (A port can operate as both an authenticator and a supplicant.)
Example
Suppose that you want to connect two switches, where:
■
Switch “A” has port A1 configured for 802.1X supplicant operation.
■
You want to connect port A1 on switch “A” to port B5 on switch “B”.
RADIUS Server
Switch “A”
Port A1 Configured as an
802.1X Supplicant
Port A1
Switch “B”
Port B5
LAN Core
Figure 10-6. Example of Supplicant Operation
1. When port A1 on switch “A” is first connected to a port on switch “B”, or
if the ports are already connected and either switch reboots, port A1
begins sending start packets to port B5 on switch “B”.
10-42
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......