Configuring Port-Based and Client-Based Access Control (802.1X)
Operating Notes
Operating Notes
■
Applying Web Authentication or MAC Authentication Concur
rently with Port-Based 802.1X Authentication:
While 802.1X port-
based access control can operate concurrently with Web Authentication
or MAC Authentication, port-based access control is subordinate to Web-
Auth and MAC-Auth operation. If 802.1X operates in port-based mode and
MAC or Web authentication is enabled on the same port, any 802.1X
authentication has no effect on the ability of a client to access the
controlled port. That is, the client’s access will be denied until the client
authenticates through Web-Auth or MAC-Auth on the port. Note also that
a client authenticating with port-based 802.1X does not open the port in
the same way that it would if Web-Auth or MAC-Auth were not enabled.
That is, any non-authenticating client attempting to access the port after
another client authenticates with port-based 802.1X would still have to
authenticate through Web-Auth or MAC-Auth.
10-57
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......