13-29
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
Operating Notes
■
Using the
aaa port-access controlled-directions in
command, you can enable
the transmission of Wake-on-LAN traffic on unauthenticated egress ports
that are configured for any of the following port-based security features:
•
802.1X authentication
•
MAC authentication
•
Web authentication
Because a port can be configured for more than one type of authentication
to protect the switch from unauthorized access, the last setting you
configure with the
aaa port-access controlled-directions
command is
applied to all authentication methods configured on the switch.
For information about how to configure and use MAC and Web
authentication, refer to chapter 4, “Web and MAC Authentication”.
■
To display the currently configured 802.1X Controlled Directions value,
enter the
show port-access authenticator config
command as shown in
Figure 13-12.
■
When an 802.1X-authenticated port is configured with the
controlled-
directions in
setting, eavesdrop prevention is not supported on the
port.
Example: Configuring 802.1X Controlled Directions
The following example shows how to enable the transmission of Wake-on-
LAN traffic in the egress direction on an 802.1X-aware port before it transitions
to the 802.1X authenticated state and successfully authenticates a client
device.
Figure 13-7. Example of Configuring 802.1X Controlled Directions
Unauthenticated VLAN Access (Guest VLAN Access)
When a PC is connected through an IP phone to a switch port that has been
authorized using 802.1X or Web/MAC authentication, the IP phone is authen-
ticated using client-based 802.1X or Web/MAC authentication and has access
to secure, tagged VLANs on the port. If the PC is unauthenticated, it needs to
HP Switch(config)# aaa port-access authenticator 10
HP Switch(config)# aaa authentication port-access eap-radius
HP Switch(config)# aaa port-access authenticator active
HP Switch(config)# aaa port-access 10 controlled-directions in
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......