13-13
Configuring Port-Based and User-Based Access Control (802.1X)
General Setup Procedure for 802.1X Access Control
General Setup Procedure for 802.1X
Access Control
Do These Steps Before You Configure 802.1X Operation
1.
Configure a local username and password on the switch for both the
Operator (login) and Manager (enable) access levels. (While this may or
may not be required for your 802.1X configuration, HP recommends that
you use a local username and password pair at least until your other
security measures are in place.)
For switches covered in this guide, the local operator password config-
ured with the password command is not accepted as an 802.1X authenti-
cator credential. The port-access command is used to configure the
operator username and password that are used as 802.1X credentials for
network access to the switch. 802.1X network access is not allowed unless
a password has been configured using the
password port-access
command.
Figure 13-2 shows how to configure a local operator password for 802.1X
access.
Syntax:
password port-access [user-name <
name
>] <
password
>
Configures the operator username and password
used to access the network through 802.1X
authentication.
user-name <
name
>
Operator username (text string) used only for
local authentication of 802.1X clients. This
value is different from the local operator user-
name configured with the
password
command
for management access
.
<
password
>
Operator password (text string) used only for
local authentication of 802.1X clients. This
value is different from the local operator pass-
word configured with the
password
command
for management access.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......