Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
1. Enable 802.1X Authentication on Selected Ports
This task configures the individual ports you want to operate as 802.1X
authenticators for point-to-point links to 802.1X-aware clients or switches,
and consists of two steps:
A. Enable the selected ports as authenticators.
B. Specify either client-based or port-based 802.1X authentication.
(Actual 802.1X operation does not commence until you perform step 5 on page
10-23 to activate 802.1X authentication on the switch.)
N o t e
If you enable 802.1X authentication on a port, the switch automatically dis
ables LACP on that port. However, if the port is already operating in an LACP
trunk, you must remove the port from the trunk before you can configure it
for 802.1X authentication.
A. Enable the Selected Ports as Authenticators and Enable
the (Default) Port-Based Authentication
Syntax:
[ no ] aaa port-access authenticator <
port-list
>
Enables specified ports to operate as 802.1X authenticators
and enables port-based authentication. (To enable client-
based authentication, execute this command first, and then
execute the client-limit < port-list > version of this command
described in the next section.) The
no
form of the command
removes 802.1X authentication from
<
port-list
>
. To activate
configured 802.1X operation, you must enable 802.1X
authentication. Refer to “5. Enable 802.1X Authentication
on the switch” on page 10-15
10-17
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......