13-15
Configuring Port-Based and User-Based Access Control (802.1X)
General Setup Procedure for 802.1X Access Control
3.
Determine whether to use user-based access control (page 13-3) or port-
based access control (page 13-3).
4.
Determine whether to use the optional 802.1X Open VLAN mode for
clients that are not 802.1X-aware; that is, for clients that are not running
802.1X supplicant software. (This will require you to provide download-
able software that the client can use to enable an authentication session.)
For more on this topic, refer to “802.1X Open VLAN Mode” on page 13-32.
5.
For any port you want to operate as a supplicant, determine the user
credentials. You can either use the same credentials for each port or use
unique credentials for individual ports or subgroups of ports. (This can
also be the same local username/password pair that you assign to the
switch.)
6.
Unless you are using only the switch’s local username and password for
802.1X authentication, configure at least one RADIUS server to authenti-
cate access requests coming through the ports on the switch from external
supplicants (including switch ports operating as 802.1X supplicants). You
can use up to three RADIUS servers for authentication; one primary and
two backups. Refer to the documentation provided with your RADIUS
application.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......