Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
N o t e
If you want to implement the optional port security feature (step 7) on the
switch, you should first ensure that the ports you have configured as 802.1X
authenticators operate as expected.
7. If you are using Port Security on the switch, configure the switch to allow
only 802.1X access on ports configured for 802.1X operation, and (if
desired) the action to take if an unauthorized device attempts access
through an 802.1X port. Refer to page 10-40.
8. If you want a port on the switch to operate as a supplicant on a port
operating as an 802.1X authenticator on another device, then configure
the supplicant operation. (Refer to “Configuring Switch Ports To Operate
As Supplicants for 802.1X Connections to Other Switches” on page 10-42.)
Configuring Switch Ports as 802.1X
Authenticators
802.1X Authentication Commands
Page
[no] aaa port-access authenticator <
port-list
>
10-17
[auth-vid | clear-statistics | client-limit | control | max-requests |
initialize | logoff-period | quiet-period | server-timeout |
reauthenticate | reauth-period | supplicant-timeout | tx-period |
unauth-period | unauth-vid ]
aaa authentication port-access
< local | eap-radius | chap-radius >
[no] aaa port-access authenticator active
[no] port-security [ethernet] <
port-list
> learn-mode port-access
802.1X Open VLAN Mode Commands
802.1X Supplicant Commands
802.1X-Related Show Commands
RADIUS server configuration
10-16
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......