Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches
Supplicant Port Configuration
Enabling a Switch Port as a Supplicant.
You can configure a switch port
as a supplicant for a point-to-point link to an 802.1X-aware port on another
switch.
Configure the port as a supplicant before configuring any suppli-
cant-related parameters.
Syntax:
[no] aaa port-access supplicant [ethernet] <
port-list
>
Configures a port as a supplicant with either the default supp-
licant settings or any previously configured supplicant set-
tings, whichever is most recent. The “
no
” form of the command
disables supplicant operation on the specified ports.
Configuring a Supplicant Switch Port.
You must enable supplicant oper
ation on a port before changing the supplicant configuration. This means you
must execute the supplicant command once without any other parameters,
then execute it again with a supplicant parameter you want to configure. If
the intended authenticator port uses RADIUS authentication, then use the
identity
and
secret
options to configure the RADIUS-expected credentials on
the supplicant port. If the intended authenticator port uses Local 802.1X
authentication, then use the
identity
and
secret
options to configure the
authenticator switch’s local username and password on the supplicant port.
Syntax:
aaa port-access supplicant [ethernet] <
port-list
>
To enable supplicant operation on the designated ports,
execute this command without any other parameters.
After doing this, you can use the command again with the
following parameters to configure supplicant opertion.
(Use one instance of the command for each parameter you
want to configure The
no
form disables supplicant opera-
tion on the designated port(s).
[identity <
username
>]
Sets the username and password to pass to the authenti-
cator port when a challenge-request packet is received from
the authenticator port due to an authentication request. If
the intended authenticator port is configured for RADIUS
authentication, then
< username >
and
< password >
must
be the username and password expected by the RADIUS
server. If the intended authenticator port is configured for
Local authentication, then
< username >
and
< password >
must be the username and password configured on the
Authenticator switch. (Default: Null.)
10-44
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......