Configuring Port-Based and Client-Based Access Control (802.1X)
802.1X Open VLAN Mode
802.1X Open VLAN Mode
802.1X Authentication Commands
page 10-16
802.1X Supplicant Commands
page 10-44
802.1X Open VLAN Mode Commands
[no] aaa port-access authenticator <
port-list
>
page 10-38
[auth-vid <
vlan-id
>]
[unauth-vid <
vlan-id
>]
802.1X-Related Show Commands
page 10-46
RADIUS server configuration
pages 10-22
Introduction
This section describes how to use the 802.1X Open VLAN mode to provide a
path for clients that need to acquire 802.1X supplicant software before
proceeding with the authentication process. The Open VLAN mode involves
options for configuring unauthorized-client and authorized-client VLANs on
ports configured as 802.1X authenticators.
Configuring the 802.1X Open VLAN mode on a port changes how the port
responds when it detects a new client. In earlier releases, a “friendly” client
computer not running 802.1X supplicant software could not be authenticated
on a port protected by 802.1X access security. As a result, the port would
become blocked and the client could not access the network. This prevented
the client from:
■
Acquiring IP addressing from a DHCP server
■
Downloading the 802.1X supplicant software necessary for an authenti
cation session
The 802.1X Open VLAN mode solves this problem by temporarily suspending
the port’s static VLAN memberships and placing the port in a designated
Unauthorized-Client VLAN
(sometimes termed a
guest
VLAN)
.
In this state
the client can proceed with initialization services, such as acquiring IP
addressing and 802.1X client software, and starting the authentication
process.
10-24
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......