8-3
Configuring Port-Based and Client-Based Access Control (802.1X)
Overview
Overview
Why Use Port-Based or Client-Based Access Control?
Local Area Networks are often deployed in a way that allows unauthorized
clients to attach to network devices, or allows unauthorized users to get
access to unattended clients on a network. Also, the use of DHCP services and
zero configuration make access to networking services easily available. This
exposes the network to unauthorized use and malicious attacks. While access
to the network should be made easy, uncontrolled and unauthorized access
is usually not desirable. 802.1X simplifies security management by providing
access control along with the ability to control user profiles from up to three
RADIUS servers while allowing a given user to use the same entering valid
user credentials for access from multiple points within the network.
General Features
802.1X on the ProCurve switches covered in this manual includes the follow-
ing:
■
Switch operation as both an authenticator (for supplicants having a
point-to-point connection to the switch) and as a supplicant for point-
to-point connections to other 802.1X-aware switches.
•
Authentication of 802.1X clients using a RADIUS server and either the
EAP (Extensible Authentication Protocol) or CHAP (Challenge Hand-
shake Authentication Protocol).
•
Provision for enabling clients that do not have 802.1 supplicant soft-
ware to use the switch as a path for downloading the software and
initiating the authentication process (802.1X Open VLAN mode).
Feature
Default
Menu
CLI
Web
Configuring Switch Ports as 802.1X Authenticators
Disabled
n/a
page 8-17
n/a
Configuring 802.1X Open VLAN Mode
Disabled
n/a
page 8-26
n/a
Configuring Switch Ports to Operate as 802.1X Supplicants
Disabled
n/a
page 8-42
n/a
Displaying 802.1X Configuration, Statistics, and Counters
n/a
n/a
page 8-47
n/a
How 802.1X Affects VLAN Operation
n/a
n/a
page 8-54
n/a
RADIUS Authentication and Accounting
Refer to “RADIUS Authentication, Authorization and
Accounting” on page 5-1
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......