General 802.1X Authenticator Operation
. . . . . . . . . . . . . . . . . . . . . . 10-9
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 10-9
VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10
General Operating Rules and Notes
. . . . . . . . . . . . . . . . . . . . . . . . . . 10-12
General Setup Procedure for 802.1X Access Control
. . . . . . . . . . 10-14
Do These Steps Before You Configure 802.1X Operation . . . . . . . . 10-14
Overview: Configuring 802.1X Authentication on the Switch . . . . . 10-15
Configuring Switch Ports as 802.1X Authenticators
. . . . . . . . . . . 10-16
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 10-17
A. Enable the Selected Ports as Authenticators and Enable
the (Default) Port-Based Authentication . . . . . . . . . . . . . . . 10-17
B. Specify Client-Based or Return to Port-Based 802.1X
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-18
Example: Configuring Client-Based 802.1X Authentication . . . 10-19
Example: Configuring Port-Based 802.1X Authentication . . . . 10-19
2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . . 10-19
3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . . . 10-21
4. Enter the RADIUS Host IP Address(es) . . . . . . . . . . . . . . . . . . . . . 10-22
5. Enable 802.1X Authentication on the Switch . . . . . . . . . . . . . . . . 10-23
6. Optionally Resetting Authenticator Operation . . . . . . . . . . . . . . . 10-23
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-24
VLAN Membership Priorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-25
Use Models for 802.1X Open VLAN Modes . . . . . . . . . . . . . . . . . . . . 10-26
Operating Rules for Authorized-Client and
Unauthorized-Client VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-31
Setting Up and Configuring 802.1X Open VLAN Mode . . . . . . . . . . . 10-35
802.1X Open VLAN Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . 10-39
Option For Authenticator Ports: Configure Port-Security
To Allow Only 802.1X-Authenticated Devices
. . . . . . . . . . . . . . . . . 10-40
Configuring Switch Ports To Operate As Supplicants for 802.1X
Connections to Other Switches
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42
Supplicant Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-44
xi
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......