Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
eap-radius
Use EAP-RADIUS authentication. (Refer to the
documentation for your RADIUS server application.)
chap-radius
Use CHAP-RADIUS (MD-5) authentication.
(Refer to the documentation for your RADIUS server appli
cation.)
For example, to enable the switch to perform 802.1X authentication using one
or more EAP-capable RADIUS servers:
802.1X (Port-Access)
configured for EAP
RADIUS authentication.
Configuration command
for EAP-RADIUS
authentication.
Figure 10-4. Example of 802.1X (Port-Access) Authentication
4. Enter the RADIUS Host IP Address(es)
If you select either
eap-radius
or
chap-radius
for the authentication method,
configure the switch to use 1, 2, or 3 RADIUS servers for authentication. The
following syntax shows the basic commands. For coverage of all commands
related to RADIUS server configuration, refer to chapter 6, “RADIUS Authen
tication and Accounting”.
Syntax:
radius host <
ip-address
>
Adds a server to the RADIUS configuration.
[key <
server-specific key-string
>]
Optional. Specifies an encryption key for use during
authentication (or accounting) sessions with the spec
ified server. This key must match the key used on the
RADIUS server. Use this option only if the specified
server requires a different key than configured for the
global encryption key.
10-22
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......