13-41
Configuring Port-Based and User-Based Access Control (802.1X)
802.1X Open VLAN Mode
Effect of RADIUS-assigned VLAN
This rule assumes no other authenticated
clients are already using the port on a
different VLAN.
The port joins the RADIUS-assigned VLAN as an untagged member.
IP Addressing for a Client Connected
to a Port Configured for 802.x Open
VLAN Mode
A client can either acquire an IP address from a DHCP server or use
a manually configured IP address before connecting to the switch.
802.1X Supplicant Software for a
Client Connected to a Port Configured
for 802.1X Open VLAN Mode
A friendly client, without 802.1X supplicant software, connecting to an
authenticator port must be able to download this software from the
Unauthorized-Client VLAN before authentication can begin.
Switch with a Port Configured To
Allow Multiple Authorized-Client
Sessions
When a new client is authenticated on a given port:
• If no other clients are authenticated on that port, then the port joins
one VLAN in the following order of precedence:
a.
A RADIUS-assigned VLAN, if configured.
b.
An Authenticated-Client VLAN, if configured.
c.
A static, port-based VLAN to which the port belongs as an
untagged member.
d.
Any VLAN(s) to which the port is configured as a tagged
member (provided that the client can operate in that VLAN).
• If another client is already authenticated on the port, then the port
is already assigned to a VLAN for the previously-existing client
session, and the new client must operate in this same VLAN,
regardless of other factors. (This means that a client without 802.1X
client authentication software cannot access a configured,
Unauthenticated-Client VLAN if another, authenticated client is
already using the port.)
Condition
Rule
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......