8-49
Configuring Port-Based and Client-Based Access Control (802.1X)
Displaying 802.1X Configuration, Statistics, and Counters
Figure 8-7. Example of show port-access authenticator config Command
Table 8-2.
Field Descriptions of show port-access authenticator config Command Output (Figure 8-7)
Field
Description
Port-access
authenticator activated
Whether 802.1X authentication is enabled or disabled on specified port(s).
Port
Port number on switch.
Re-auth Period
Period of time (in seconds) after which clients connected to the port need to be re-
authenticated.
Access Control
Port’s authentication mode:
Auto:
Network access is allowed to any connected device that supports 802.1X authentication
and provides valid 802.1X credentials.
Authorized:
Network access is allowed to any device connected to the port, regardless of
whether it meets 802.1X criteria.
Unauthorized:
Network access is blocked to any device connected to the port, regardless of
whether the device meets 802.1X criteria.
Max reqs
Number of authentication attempts that must time-out before authentication fails and the
authentication session ends.
Quiet Period
Period of time (in seconds) during which the port does not try to acquire a supplicant.
TX Timeout
Period of time (in seconds) that the port waits to retransmit the next EAPOL PDU during an
authentication session.
Supplicant Timeout
Period of time (in seconds) that the switch waits for a supplicant response to an EAP request.
Server Timeout
Period of time (in seconds) that the switch waits for a server response to an authentication
request.
ProCurve(config)# show port-access authenticator config
Port Access Authenticator Configuration
Port-access authenticator activated [No] : No
| Re-auth Access Max Quiet TX Supplicant Server
Port | Period Control Reqs Period Timeout Timeout Timeout
---- + ------- -------- ----- ------- -------- ---------- --------
1 | No Auto 2 60 30 30 30
2 | No Auto 2 60 30 30 30
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......