13-24
Configuring Port-Based and User-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
3. Configure the 802.1X Authentication Method
This task specifies how the switch authenticates the credentials provided by
a supplicant connected to a switch port configured as an 802.1X authenticator
You can configure
local
,
chap-radius
or
eap-radius
as the primary password
authentication method for the port-access method. You also need to select
none or authorized
as a secondary, or backup, method.
Syntax:
aaa authentication port-access <chap-radius |eap-radius | local>
Configures
local
,
chap-radius (
MD5
)
, or
eap-radius
as the primary
password authentication method for port-access. The default pri-
mary authentication is
local
. (Refer to the documentation for
your RADIUS server application.)
For switches covered in this guide, you must use the
password port-access
command to configure the operator user-
name and password for 802.1X access. See “General Setup Proce-
dure for 802.1X Access Control” on page 13-13 for more
information.
[<none | authorized >]
Provides options for secondary authentication. The
none
option specifies that a backup authentication
method is not used. The
authorized
option allows access
without authentication. (default:
none
).
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......