8-16
Configuring Port-Based and Client-Based Access Control (802.1X)
General Setup Procedure for 802.1X Access Control
7.
If you are using Port Security on the switch, configure the switch to allow
only 802.1X access on ports configured for 802.1X operation, and (if
desired) the action to take if an unauthorized device attempts access
through an 802.1X port. See page 8-40.
8.
If you want a port on the switch to operate as a supplicant in a connection
with a port operating as an 802.1X authenticator on another device, then
configure the supplicant operation. (Refer to “Configuring Switch Ports
To Operate As Supplicants for 802.1X Connections to Other Switches” on
page 8-42.)
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......