U
SER
A
UTHENTICATION
3-63
Configuring Port Settings for 802.1x
When 802.1X is enabled, you need to configure the parameters for the
authentication process that runs between the client and the switch (i.e.,
authenticator), as well as the client identity lookup process that runs
between the switch and authentication server. These parameters are
described in this section.
Command Attributes
•
Port
– Port number.
•
Status
– Indicates if authentication is enabled or disabled on the port.
(Default: Disabled)
•
Operation Mode
– Allows single or multiple hosts (clients) to connect
to an 802.1X-authorized port. (Options: Single-Host, Multi-Host;
Default: Single-Host)
•
Max Count
– The maximum number of hosts that can connect to a
port when the Multi-Host operation mode is selected. (Range: 1-1024;
Default: 5)
•
Mode
– Sets the authentication mode to one of the following options:
-
Auto
– Requires a dot1x-aware client to be authorized by the
authentication server. Clients that are not dot1x-aware will be denied
access.
-
Force-Authorized
– Forces the port to grant access to all clients,
either dot1x-aware or otherwise.
-
Force-Unauthorized
– Forces the port to deny access to all clients,
either dot1x-aware or otherwise.
•
Re-authen
– Sets the client to be re-authenticated after the interval
specified by the Re-authentication Period. Re-authentication can be
used to detect if a new device is plugged into a switch port. (Default:
Disabled)
Summary of Contents for TigerSwitch 1000
Page 2: ......
Page 19: ...CONTENTS xv...
Page 23: ...TABLES xix...
Page 36: ...INTRODUCTION 1 10...
Page 155: ...PORT CONFIGURATION 3 107 Figure 3 50 Displaying Etherlike and RMON Statistics...
Page 222: ...CONFIGURING THE SWITCH 3 174...
Page 417: ...VLAN COMMANDS 4 195 This section describes commands used to configure private VLANs...
Page 466: ...TROUBLESHOOTING B 4...
Page 479: ......