8-44
Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches
•
A “failure” response continues the block on port B5 and causes port
A1 to wait for the “held-time” period before trying again to achieve
authentication through port B5.
Supplicant Port Configuration
Enabling a Switch Port To Operate as a Supplicant.
You can configure
one or more switch ports to operate as supplicants for point-to-point links to
802.1X-aware ports on other switches.
You must configure a port as a
supplicant before you can configure any supplicant-related parameters
.
Configuring a Supplicant Switch Port.
Note that you must enable suppli-
cant operation on a port before you can change the supplicant configuration.
This means you must execute the supplicant command once without any other
parameters, then execute it again with a supplicant parameter you want to
configure. If the intended authenticator port uses RADIUS authentication,
then use the
identity
and
secret
options to configure the RADIUS-expected
username and password on the supplicant port. If the intended authenticator
port uses Local 802.1X authentication, then use the
identity
and
secret
options
to configure the authenticator switch’s local username and password on the
supplicant port.
Syntax:
[no] aaa port-access supplicant [ethernet] <
port-list
>
Configures a port to operate as a supplicant using either the
default supplicant parameters or any previously configured
supplicant parameters, whichever is the most recent. The
“
no
” form of the command disables supplicant operation on
the specified ports.
Syntax
:
aaa port-access supplicant [ethernet] <
port-list
>
To enable supplicant operation on the designated ports,
execute this command without any other parameters.
After doing this, you can use the command again with
the following parameters to configure supplicant oper-
tion. (Use one instance of the command for each
parameter you want to configure The
no
form disables
supplicant operation on the designated port(s).
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......