8-45
Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches
Syntax
:
aaa port-access supplicant [ethernet] <
port-list
>
To enable supplicant operation on the designated ports,
execute this command without any other parameters.
After doing this, you can use the command again with
the following parameters to configure supplicant oper-
tion. (Use one instance of the command for each
parameter you want to configure The
no
form disables
supplicant operation on the designated port(s).
[identity <
username
>]
Sets the username and password to pass to the authen-
ticator port when a challenge-request packet is received
from the authenticator port in response to an authen-
tication request. If the intended authenticator port is
configured for RADIUS authentication, then
< user-
name >
and
< password >
must be the username and
password expected by the RADIUS server. If the
intended authenticator port is configured for Local
authentication, then
< username >
and
< password >
must be the username and password configured on the
Authenticator switch. (Defaults: Null)
[secret]
Enter secret:
<
password
>
Repeat secret:
<
password
>
Sets the secret password to be used by the port suppli-
cant when an MD5 authentication request is received
from an authenticator. The switch prompts you to enter
the secret password after the command is invoked.
aaa port-access supplicant [ethernet] <
port-list
>
[auth-timeout < 1 - 300 >]
Sets the period of time the port waits to receive a
challenge from the authenticator. If the request times
out, the port sends another authentication request, up
to the number of attempts specified by the
max-start
parameter. (Default: 30 seconds).
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......