6-44
RADIUS Authentication, Authorization, and Accounting
VLAN Assignment in an Authentication Session
VLAN Assignment in an Authentication
Session
A switch supports concurrent 802.1X and either Web- or MAC-authentication
sessions on a port (with up to 32 clients allowed). If you have configured
RADIUS as the primary authentication method for a type of access, when a
client authenticates on a port, the RADIUS server assigns an untagged VLAN
that is statically configured on the switch for use in the authentication session.
(For information on how to configure a user profile on a RADIUS server with
the VLAN to be assigned for 802.1X, Web, or MAC authentication, refer to the
documentation provided with the RADIUS server application.)
If a switch port is configured to accept multiple 802.1X and/or Web- or MAC-
Authentication client sessions, all authenticated clients must use the same
port-based, untagged VLAN membership assigned for the earliest, currently
active client session. On a port where one or more authenticated client
sessions are already running, all clients are on the same untagged VLAN. If the
RADIUS server subsequently authenticates a new client, but attempts to re-
assign the port to a different, untagged VLAN than the one already in use for
the previously existing, authenticated client sessions, the connection for the
new client will fail.
Tagged and Untagged VLAN Attributes
When you configure a user profile on a RADIUS server to assign a VLAN to an
authenticated client, you can use either the VLAN’s name or VLAN ID (VID)
number. For example, if a VLAN configured in the switch has a VID of 100 and
is named
vlan100
, you could configure the RADIUS server to use either “100”
or “vlan100” to specify the VLAN.
After the RADIUS server validates a client’s username and password, the
RADIUS server returns an Access-Accept packet that contains the VLAN
assignment and the following attributes for use in the authentication session:
■
Egress-VLANID: Configures an optional, egress VLAN ID for either
tagged or untagged packets (RFC 4675).
■
Egress-VLAN-Name: Configures an optional, egress VLAN for either
tagged or untagged packets when the VLAN ID is not known (RFC
4675).
■
Tunnel-Type, Tunnel-Medium-Type, and Tunnel-Private-Group-ID:
Tunnel attributes that specify an untagged VLAN assignment (RFC
3580).
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......