13-18
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
1. Enable 802.1X Authentication on Selected Ports
This task configures the individual ports you want to operate as 802.1X
authenticators for point-to-point links to 802.1X-aware clients or switches,
and consists of two steps:
A.
Enable the selected ports as authenticators.
B.
Specify either user-based or port-based 802.1X authentication.
(Actual 802.1X operation does not commence until you perform step 5 on page
13-26 to activate 802.1X authentication on the switch.)
N o t e
If you enable 802.1X authentication on a port, the switch automatically dis-
ables LACP on that port. However, if the port is already operating in an LACP
trunk, you must remove the port from the trunk before you can configure it
for 802.1X authentication.
A. Enable the Selected Ports as Authenticators and Enable
the (Default) Port-Based Authentication
Syntax:
[ no ] aaa port-access authenticator <
port-list
>
Enables specified ports to operate as 802.1X authenticators
and enables port-based authentication. (To enable user-
based authentication, execute this command first, and then
execute the client-limit < port-list > version of this command
described in the next section.) The
no
form of the command
removes 802.1X authentication from
<
port-list
>
. To activate
configured 802.1X operation, you must enable 802.1X
authentication. Refer to “5. Enable 802.1X Authentication
on the switch” on page 13-26
.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......