8-31
Configuring Port-Based and Client-Based Access Control (802.1X)
802.1X Open VLAN Mode
Operating Rules for Authorized-Client and
Unauthorized-Client VLANs
Open VLAN Mode with
Only
an
Authorized-Client VLAN
Configured:
• Port automatically blocks a client that cannot initiate an
authentication session.
• If the client successfully completes an authentication session, the
port becomes an untagged member of this VLAN.
Note:
if RADIUS authentication assigns a VLAN, the port
temporarily becomes an untagged member of the RADIUS-
assigned VLAN —instead of the Authorized-Client VLAN—while
the client is connected.
• If the port is statically configured as a tagged member of any other
VLAN, the port returns to tagged membership in this VLAN upon
successful client authentication. This happens even if the RADIUS
server assigns the port to another, authorized VLAN. If the port is
already configured as a tagged member of a VLAN that RADIUS
assigns as an authorized VLAN, then the port becomes an
untagged member of that VLAN for the duration of the client
connection. After the client disconnects, the port returns to
tagged membership in that VLAN.
Table 8-1.
802.1X Open VLAN Mode Options
802.1X Per-Port Configuration
Port Response
Condition
Rule
Static VLANs used as
Authorized-
Client
or
Unauthorized-Client
VLANs
These must be configured on the switch before you configure an
802.1X authenticator port to use them. (Use the
vlan <
vlan-id
>
command or the VLAN Menu screen in the Menu interface.)
VLAN Assignment Received from a
RADIUS Server
If the RADIUS server specifies a VLAN for an authenticated supplicant
connected to an 802.1X authenticator port, this VLAN assignment
overrides any Authorized-Client VLAN assignment configured on the
authenticator port. This is because both VLANs are untagged, and the
switch allows only one untagged VLAN membership per-port. For
example, suppose you configured port A4 to place authenticated
supplicants in VLAN 20. If a RADIUS server authenticates supplicant
“A” and assigns this supplicant to VLAN 50, then the port can access
VLAN 50 as an untagged member while the client session is running.
When the client disconnects from the port, then the port drops these
assignments and uses the untagged VLAN memberships for which it
is statically configured. (After client authentication, the port resumes
any tagged VLAN memberships for which it is already configured. For
details, refer to the Note on page 8-28.)
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......