8-36
Configuring Port-Based and Client-Based Access Control (802.1X)
802.1X Open VLAN Mode
2.
Configure the 802.1X authentication type. Options include:
3.
If you selected either
eap-radius
or
chap-radius
for step 2, use the
radius
host
command to configure up to three RADIUS server IP address(es) on
the switch.
4.
Activate authentication on the switch.
5.
Test both the authorized and unauthorized access to your system to
ensure that the 802.1X authentication works properly on the ports you
have configured for port-access.
Syntax
:
aaa authentication port-access < local | eap-radius | chap-radius >
Determines the type of RADIUS authentication to use.
local
:
Use the switch’s local username and password for
supplicant authentication (the default).
eap-radius
Use EAP-RADIUS authentication. (Refer to the
documentation for your RADIUS server.)
chap-radius
Use CHAP-RADIUS (MD5) authentication.
(Refer to the documentation for your RADIUS server
software.)
Syntax
:
radius host <
ip-address
>
Adds a server to the RADIUS configuration.
[key <
server-specific key-string
>]
Optional. Specifies an encryption key for use with the
specified server. This key must match the key used on
the RADIUS server. Use this option only if the specified
server requires a different key than configured for the
global encryption key.
radius-server key <
global key-string
>
Specifies the global encryption key the switch uses for
sessions with servers for which the switch does not
have a server-specific key. This key is optional if all
RADIUS server addresses configured in the switch
include a server- specific encryption key.
Syntax
:
aaa port-access authenticator active
Activates 802.1X port-access on ports you have config-
ured as authenticators.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......