8-18
Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
A. Enable the Selected Ports as Authenticators and Enable
the (Default) Port-Based Authentication
B. Specify Client-Based or Return to Port-Based 802.1X
Authentication
Client-Based 802.1X Authentication.
Syntax:
[ no ] aaa port-access authenticator <
port-list
>
Enables specified ports to operate as 802.1X authenticators
and enables port-based authentication. (To enable client-
based authentication, execute this command first, and then
execute the client-limit < port-list > version of this command
described in the next section.) The
no
form of the command
removes 802.1X authentication from
<
port-list
>
. To activate
configured 802.1X operation, you must enable 802.1X
authentication. Refer to “5. Enable 802.1X Authentication
on the switch” on page 8-24
.
Syntax:
aaa port-access authenticator client-limit <
port-list
> < 1 - 2>
Used after executing
aaa port-access authenticator <
port-list
>
(above) to convert authentication from port-based to client-
based
.
Specifies client-based 802.1X authentication and the
maximum number of 802.1X-authenticated client sessions
allowed on each of the ports in
<
port-list
>.
If a port currently
has no authenticated client sessions, the next authenticated
client session the port accepts determines the untagged
VLAN membership to which the port is assigned during the
session. If another client session begins later on the same
port while an earlier session is active, the later session will
be on the same untagged VLAN membership as the earlier
session.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......