Configuring Port-Based and Client-Based Access Control (802.1X)
Overview
Overview
Feature
Default
Menu
CLI
Web
Configuring Switch Ports as 802.1X Authenticators
Disabled
n/a
n/a
Configuring 802.1X Open VLAN Mode
Disabled
n/a
page 10-24
n/a
Configuring Switch Ports to Operate as 802.1X Supplicants
Disabled
n/a
page 10-42
n/a
Displaying 802.1X Configuration, Statistics, and Counters
n/a
n/a
page 10-46
n/a
How 802.1X Affects VLAN Operation
n/a
n/a
page 10-53
n/a
RADIUS Authentication and Accounting
Refer to chapter 6, “RADIUS Authentication and
Accounting”
Why Use Port-Based or Client-Based Access Control?
Local Area Networks are often deployed in a way that allows unauthorized
clients to attach to network devices, or allows unauthorized users to get
access to unattended clients on a network. Also, the use of DHCP services and
zero configuration make access to networking services easily available. This
exposes the network to unauthorized use and malicious attacks. While access
to the network should be made easy, uncontrolled and unauthorized access is
usually not desirable. 802.1X simplifies security management by providing
access control along with the ability to control user profiles from up to three
RADIUS servers while allowing a given user to use the same entering valid
user credentials for access from multiple points within the network.
General Features
802.1X on the switches covered in this guide includes the following:
■
Switch operation as both an authenticator (for supplicants having a point-
to-point connection to the switch) and as a supplicant for point-to-point
connections to other 802.1X-aware switches.
•
Authentication of 802.1X access using a RADIUS server and either the
EAP or CHAP protocol.
•
Provision for enabling clients that do not have 802.1 supplicant soft-
ware to use the switch as a path for downloading the software and
initiating the authentication process (802.1X Open VLAN mode).
•
Client-Based access control option with support for up to 32 authen
ticated clients per-port.
10-3
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......