3-20
Web and MAC Authentication
Configuring Web Authentication
Syntax:
aaa port-access web-based [e] <
port-list
>
[logoff-period] <60-9999999>]
Specifies the period, in seconds, that the switch
enforces for an implicit logoff. This parameter is
equivalent to the MAC age interval in a traditional
switch sense. If the switch does not see activity after a
logoff-period interval, the client is returned to its pre-
authentication state. (Default: 300 seconds)
Syntax:
aaa port-access web-based [e] <
port-list
> [max-requests <1-10>]
Specifies the number of authentication attempts that
must time-out before authentication fails.
(Default: 2)
Syntax:
aaa port-access web-based [e] <
port-list
> [max-retries <1-10>]
Specifies the number of the number of times a client
can enter their user name and password before authen-
tication fails. This allows the reentry of the user name
and password if necessary.
(Default: 3)
Syntax:
aaa port-access web-based [e] <
port-list
> [quiet-period <1 - 65535>]
Specifies the time period, in seconds, the switch should
wait before attempting an authentication request for
a client that failed authentication.
(Default: 60 seconds)
Syntax:
aaa port-access web-based [e] <
port-list
> [reauth-period <0 - 9999999>]
Specifies the time period, in seconds, the switch
enforces on a client to re-authenticate. When set to
0
,
reauthentication is disabled. (Default: 300 seconds)
Syntax:
aaa port-access web-based [e] <
port-list
> [reauthenticate]
Forces a reauthentication of all attached clients on the
port.
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......