13-49
Configuring Port-Based and User-Based Access Control (802.1X)
Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X-Authenticated Devices
reauthenticate itself. If there are multiple clients authenticated on the
port, if one client loses access and attempts to re-authenticate, that client
will be handled as a new client on the port.
■
The first client to authenticate on a port configured to support multiple
clients will determine the port’s VLAN membership for any subsequent
clients that authenticate while an active session is already in effect.
Option For Authenticator Ports:
Configure Port-Security
To Allow Only 802.1X-Authenticated
Devices
If 802.1X authentication is disabled on a port or set to
authorized
(Force
Authorize), the port can allow access to a non-authenticated client. Port-
Security operates with 802.1X authentication only if the selected ports are
configured as 802.1X
with
the
control
mode in the port-access authenticator
command set to
auto
(the default setting). For example, if port A10 was at a
non-default 802.1X setting and you wanted to configure it to support the port-
security option, you would use the following
aaa port-access
command:
Figure 13-9. Port-Access Support for Port-Security Operation
HP Switch(config)# aaa port-access authenticator 10 control auto
HP Switch(config)# show port-access authenticator 10 config
Port Access Authenticator Configuration
Port-access authenticator activated [No] : Yes
Allow RADIUS-assigned dynamic (GVRP) VLANs [No] : No
| Re-auth Access Max Quiet TX Supplicant Server Cntrl
Port | Period Control Reqs Period Timeout Timeout Timeout Dir
---- + ------- -------- ----- ------- -------- ---------- -------- -----
A10 | No Auto 2 60 30 30 30 both
Control mode
required for Port-
Security Support
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......