8-43
Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches
Example
Suppose that you want to connect two switches, where:
■
Switch “A” has port A1 configured for 802.1X supplicant operation
■
You want to connect port A1 on switch “A” to port B5 on switch “B”.
Figure 8-6. Example of Supplicant Operation
1.
When port A1 on switch “A” is first connected to a port on switch “B”, or
if the ports are already connected and either switch reboots, port A1
begins sending start packets to port B5 on switch “B”.
•
If, after the supplicant port sends the configured number of start
request packets, it does not receive a response, it assumes that switch
“B” is not 802.1X-aware, and transitions to the authenticated state. If
switch “B” is operating properly and is not 802.1X-aware, then the link
should begin functioning normally, but without 802.1X security.
•
If, after sending one or more start request packets, port A1 receives
a request packet from port B5, then switch “B” is operating as an
802.1X authenticator. The supplicant port then sends a response/ID
packet. If switch “B” is configured for RADIUS authentication, it
forwards this request to a RADIUS server. If switch “B” is configured
for Local 802.1X authentication (page 8-24), the authenticator com-
pares the switch “A” response to its local username and password.
2.
The RADIUS server then responds with an access challenge that switch
“B” forwards to port A1 on switch “A”.
3.
Port A1 replies with a hash response based on its unique credentials.
Switch “B” forwards this response to the RADIUS server.
RADIUS Server
Switch “A”
Port A1 Configured as an
802.1X Supplicant
Port A1
Switch “B”
Port B5
LAN Core
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......