Configuring Port-Based Access Control (802.1X)
Overview
Overview
Feature
Default
Menu
CLI
Web
Configuring Switch Ports as 802.1X Authenticators
Disabled
n/a
n/a
Configuring 802.1X Open VLAN Mode
Disabled
n/a
page 8-21
n/a
Configuring Switch Ports to Operate as 802.1X Supplicants
Disabled
n/a
page 8-34
n/a
Displaying 802.1X Configuration, Statistics, and Counters
n/a
n/a
page 8-38
n/a
How 802.1X Affects VLAN Operation
n/a
n/a
page 8-44
n/a
RADIUS Authentication and Accounting
Refer to “RADIUS Authentication and Accounting” on page
5-1
Why Use Port-Based Access Control?
Local area networks are often deployed in a way that allows unauthorized
clients to attach to network devices, or allows unauthorized users to get
access to unattended clients on a network. Also, the use of DHCP services and
zero configuration make access to networking services easily available. This
exposes the network to unauthorized use and malicious attacks. While access
to the network should be made easy, uncontrolled and unauthorized access is
usually not desirable. 802.1X provides access control along with the ability to
control user profiles from a central RADIUS server while allowing users
access from multiple points within the network.
General Features
802.1X on the HP ProCurve switches covered in this manual includes the
following:
■
Switch operation as both an authenticator (for supplicants having a
point-to-point connection to the switch) and as a supplicant for point-
to-point connections to other 802.1X-aware switches.
•
Authentication of 802.1X clients using a RADIUS server and either the
EAP or CHAP protocol.
•
Provision for enabling clients that do not have 802.1 supplicant soft-
ware to use the switch as a path for downloading the software and
initiating the authentication process (802.1X Open VLAN mode).
•
Supplicant implementation using CHAP authentication and indepen
dent username and password configuration on each port.
■
Prevention of traffic flow in either direction on unauthorized ports.
8-3
Содержание ProCurve 2800 Series
Страница 2: ......
Страница 24: ...Getting Started To Set Up and Install the Switch in Your Network This page is intentionally unused 1 12 ...
Страница 44: ...Configuring Username and Password Security Front Panel Security This page is intentionally unused 2 20 ...
Страница 132: ...RADIUS Authentication and Accounting Messages Related to RADIUS Operation This page is intentionally unused 5 32 ...
Страница 182: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 7 22 ...
Страница 268: ...Configuring and Monitoring Port Security Operating Notes for Port Security This page is intentionally unused 9 38 ...
Страница 299: ......