8-24
Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports as 802.1X Authenticators
4. Enter the RADIUS Host IP Address(es)
If you selected either
eap-radius
or
chap-radius
for the authentication method,
configure the switch to use 1 to 3 RADIUS servers for authentication. The
following syntax shows the basic commands. For coverage of all commands
related to RADIUS server configuration, refer to “RADIUS Authentication,
Authorization and Accounting” on page 5-1.
5. Enable 802.1X Authentication on the Switch
After configuring 802.1X authentication as described in the preceding four
sections, activate it with this command:
Syntax
:
radius host <
ip-address
>
Adds a server to the RADIUS configuration.
[key <
server-specific key-string
>]
Optional. Specifies an encryption key for use during
authentication (or accounting) sessions with the spec-
ified server. This key must match the key used on the
RADIUS server. Use this option only if the specified
server requires a different key than configured for the
global encryption key.
radius-server key <
global key-string
>
Specifies the global encryption key the switch uses for
sessions with servers for which the switch does not have
a server-specific key. This key is optional if all RADIUS
server addresses configured in the switch include a
server- specific encryption key.
Syntax
:
aaa port-access authenticator active
Activates 802.1X port-access on ports you have configured
as authenticators.
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......