8-17
Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
Configuring Switch Ports as 802.1X
Authenticators
1. Enable 802.1X Authentication on Selected Ports
This task configures the individual ports you want to operate as 802.1X
authenticators for point-to-point links to 802.1X-aware clients or switches,
and consists of two steps:
A.
Enable the selected ports as authenticators.
B.
Specify either client-based or port-based 802.1X authentication.
(Actual 802.1X operation does not commence until you perform step 5 on page
8-15 to activate 802.1X authentication on the switch.)
N o t e
When you enable 802.1X authentication on a port, the switch automatically
disables LACP on that port. However, if the port is already operating in an
LACP trunk, you must remove the port from the trunk before you can config-
ure it for 802.1X authentication.
802.1X Authentication Commands
Page
[no] aaa port-access authenticator < [ethernet] <
port-list
>
8-17
[control | quiet-period | tx-period | client-limit | supplicant-timeout |
server-timeout | logoff-period | max-requests | reauth-period |
auth-vid | unauth-vid | initialize | reauthenticate | clear-statistics]
8-18
aaa authentication port-access
8-23
< local | eap-radius | chap-radius >
[no] aaa port-access authenticator active
8-17
[no] port-security [ethernet] <
port-list
> learn-mode port-access
8-40
802.1X Open VLAN Mode Commands
8-26
802.1X Supplicant Commands
8-42
802.1X-Related Show Commands
8-47
RADIUS server configuration
8-24
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......