13-23
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
[reauth-period < 0 - 9999999 >]
Sets the period of time after which clients connected
must be re-authenticated. When the timeout is set to 0
the reauthentication is disabled (Default: 0 second)
[unauth-vid <
vlan-id
>]
Configures an existing static VLAN to be the Unautho-
rized-Client VLAN. This enables you to provide a path
for clients without supplicant software to download the
software and begin an authentication session. Refer to
“802.1X Open VLAN Mode” on page 13-32.
aaa port-access authenticator <
port-list
>
[logoff-period]< 1 - 999999999 >
Configures the period of time the switch waits for
client activity before removing an inactive client from
the port. (Default: 300 seconds)
[unauth-period < 0-255 >]
Specifies a delay in seconds for placing a port on the
Unauthorized-Client VLAN. This delay allows more
time for a client with 802.1X supplicant capability to
initiate an authentication session. If a connected cli-
ent does not initiate a session before the timer expires,
the port is assigned to the Unauthenticated-Client
VLAN. (Default: 0 seconds)
[auth-vid
<
vid
>]
Configures an existing, static VLAN to be the Autho-
rized-Client VLAN. Refer to “802.1X Open VLAN Mode”
on page 13-32.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......