6-27
RADIUS Authentication, Authorization, and Accounting
Cached Reauthentication
Figure 6-12. Example of Configuring the Maximum Number of Consecutive Cached Reauthentications
Timing Considerations
The reauth period when the RADIUS server is unavailable is the configured
reauth period plus an additional
X
seconds, where
X
can vary from 1 to
approximately 30 seconds in most cases, depending on the number of RADIUS
servers and other RADIUS parameters. This period of time can be more or less
than 30 seconds if the default “server-timeout” values for 802.1X or Web/MAC
Syntax:
[no] aaa authentication <port-access | web-based | mac-based >
<primary method>
< secondary-method>
Allows reauthentications to succeed when the RADIUS server
is unavailable. Users already authenticated retain their
currently-assigned session attributes.
The primary methods for
port-access
authentication are
local
,
chap-radius
, or
eap-radius
.
The primary method for
web-based
or
mac-based
authentica-
tion is
chap-radius
.
The secondary methods can be
none
,
authorized
, or
cached-
reauth
.
The default secondary authentication for all types of port
access remains “none”
.
Syntax:
[no] aaa port-access <authenticator | web-based | mac-based> <
port-
list
>
cached-reauth-period [1-2147483647]
Configures the period of time (in
seconds
) during which
cached reauthentication is allowed on the port.
Default: No limit is set.
HP Switch(config)# aaa port-access web-based 6-8 cached-reauth-period 86400
The cached-reauth-period is set to 86400
seconds
(1440
minutes, or 24 hours).
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......