8-55
Configuring Port-Based and Client-Based Access Control (802.1X)
How RADIUS/802.1X Authentication Affects VLAN Operation
For example, suppose that a RADIUS-authenticated, 802.1X-aware client on
port A2 requires access to VLAN 22, but VLAN 22 is configured for no access
on port A2, and VLAN 33 is configured as untagged on port A2:
Figure 8-10. Example of an Active VLAN Configuration
In figure 8-10, if RADIUS authorizes an 802.1X client on port 2 with the
requirement that the client use VLAN 22, then:
■
VLAN 22 becomes available as Untagged on port A2 for the duration
of the session.
■
VLAN 33 becomes unavailable to port A2 for the duration of the
session (because there can be only one untagged VLAN on any port).
You can use the
show vlan <
vlan-id
>
command to view this temporary change
to the active configuration, as shown below:
■
You can see the temporary VLAN assignment by using the
show vlan
< vlan-id >
command with the
< vlan-id >
of the static VLAN that the
authenticated client is using.
Scenario:
An
authorized 802.1X
client requires access
to VLAN 22 from port
A2. However, access
to VLAN 22 is blocked
(not untagged or
tagged) on port A2 and
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......