Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
3. Configure the 802.1X Authentication Method
This task specifies how the switch authenticates the credentials provided by
a supplicant connected to a switch port configured as an 802.1X authenticator
You can configure
local
,
chap-radius
or
eap-radius
as the primary password
authentication method for the port-access method. You also need to select
none or authorized
as a secondary, or backup, method.
Syntax:
aaa authentication port-access <chap-radius |eap-radius | local>
Configures
local
,
chap-radius (
MD5
)
, or
eap-radius
as the primary
password authentication method for port-access. The default pri
mary authentication is
local
. (Refer to the documentation for
your RADIUS server application.)
For switches covered in this guide, you must use the
password port-access
command to configure the operator user-
name and password for 802.1X access. See “General Setup Proce
dure for 802.1X Access Control” on page 12-15 for more
information.
[<none | authorized >]
Provides options for secondary authentication. The
none
option specifies that a backup authentication
method is not used. The
authorized
option allows access
without authentication. (default:
none
).
For example, to enable the switch to perform 802.1X authentication using one
or more EAP-capable RADIUS servers:
802.1X (Port-Access)
configured for EAP
RADIUS authentication.
Configuration command
for EAP-RADIUS
authentication.
Figure 12-6. Example of 802.1X (Port-Access) Authentication
12-26
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......