8-37
Configuring Port-Based and Client-Based Access Control (802.1X)
802.1X Open VLAN Mode
N o t e
If you want to implement the optional port security feature on the switch, you
should first ensure that the ports you have configured as 802.1X authenticators
operate as expected. Then refer to “Option For Authenticator Ports: Configure
Port-Security To Allow Only 802.1X Devices” on page 8-40.
After you complete steps 1 and 2, the configured ports are enabled for 802.1X
authentication (without VLAN operation), and you are ready to configure
VLAN Operation.
Configuring 802.1X Open VLAN Mode.
Use these commands to actually
configure Open VLAN mode. For a listing of the steps needed to prepare the
switch for using Open VLAN mode, refer to “Preparation” on page 8-34.
For example, suppose you want to configure 802.1X port-access with Open
VLAN mode on ports A10 - A20 and:
■
These two static VLANs already exist on the switch:
•
Unauthorized, VID = 80
•
Authorized, VID = 81
■
Your RADIUS server has an IP address of 10.28.127.101. The server
uses
rad4all
as a server-specific key string. The server is connected to
a port on the Default VLAN.
Syntax
:
aaa port-access authenticator [e] <
port-list
>
[auth-vid <
vlan-id
>]
Configures an existing, static VLAN to be the Authorized-
Client VLAN.
[< unauth-vid <
vlan-id
>]
Configures an existing, static VLAN to be the Unautho-
rized-Client VLAN.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......