8-23
Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
3. Configure the 802.1X Authentication Method
This task specifies how the switch will authenticate the credentials provided
by a supplicant connected to a switch port configured as an 802.1X authenti-
cator.
For example, to enable the switch to perform 802.1X authentication using one
or more EAP-capable RADIUS servers:
Figure 8-5. Example of 802.1X (Port-Access) Authentication
Syntax
:
aaa authentication port-access < local | eap-radius | chap-radius >
Determines the type of RADIUS authentication to use.
local
Use the switch’s local username and password for
supplicant authentication.
eap-radius
Use EAP-RADIUS authentication. (Refer to the
documentation for your RADIUS server.)
chap-radius
Use CHAP-RADIUS (MD-5) authentication.
(Refer to the documentation for your RADIUS server appli-
cation.)
802.1X (Port-Access)
configured for EAP-
RADIUS authentication.
Configuration command
for EAP-RADIUS
authentication.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......