8-41
Configuring Port-Based and Client-Based Access Control (802.1X)
Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X Devices
N o t e o n
B l o c k i n g a N o n -
8 0 2 . 1 X D e v i c e
If the port’s 802.1X authenticator
control
mode is configured to
authorized
(as
shown below, instead of
auto
), then the first source MAC address from any
device, whether 802.1X-aware or not, becomes the only authorized device on
the port.
aaa port-access authenticator <
port-list
> control authorized
With 802.1X authentication disabled on a port or set to
authorized
(Force
Authorize), the port may learn a MAC address that you don’t want authorized.
If this occurs, you can block access by the unauthorized, non-802.1X device
by using one of the following options:
■
If 802.1X authentication is disabled on the port, use these command
syntaxes to enable it and allow only an 802.1X-aware device:
■
If 802.1X authentication is enabled on the port, but set to
authorized
(Force Authorized), use this command syntax to allow only an 802.1X-
aware device:
N o t e
If 802.1X port-access is configured on a given port, then port-security
learn-
mode
for that port must be set to either
continuous
(the default) or
port-access
.
In addition to the above, to use port-security on an authenticator port, use the
per-port
client-limit
option to control how many MAC addresses of 802.1X-
authenticated devices the port is allowed to learn. (Using
client-limit
sets
802.1X to client-based operation on the specified ports.) When this limit is
reached, no further devices can be authenticated until a currently authenti-
cated device disconnects and the current delay period or logoff period has
expired.
aaa port-access authenticator e <
port-list
>
Enables 802.1X authentication on the port.
aaa port-access authenticator e <
port-list
> control auto
Forces the port to accept only a device that supports 802.1X
and supplies valid credentials.
aaa port-access authenticator e <
port-list
> control auto
Forces the port to accept only a device that supports 802.1X
and supplies valid credentials.
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......