Contents
OmniSwitch AOS Release 6 Network Configuration Guide September 2009 xxix
Chapter 37 Configuring 802.1X ..................................................................................................37-1
In This Chapter ..............................................................................................................37-1
802.1X Specifications ...................................................................................................37-2
802.1X Defaults ............................................................................................................37-2
Quick Steps for Configuring 802.1X ............................................................................37-3
802.1X Overview ..........................................................................................................37-5
Supplicant Classification ........................................................................................37-5
802.1X Ports and DHCP ..................................................................................37-6
Re-authentication .............................................................................................37-6
802.1X Accounting ................................................................................................37-7
Setting Up Port-Based Network Access Control ..........................................................37-8
Setting 802.1X Switch Parameters .........................................................................37-8
Enabling MAC Authentication ........................................................................37-8
Enabling 802.1X on Ports ......................................................................................37-8
Configuring 802.1X Port Parameters .....................................................................37-9
Configuring the Port Control Direction ...........................................................37-9
Configuring the Port Authorization .................................................................37-9
Configuring 802.1X Port Timeouts .................................................................37-9
Configuring the Maximum Number of Requests ..........................................37-10
Configuring the Number of Polling Retries ..................................................37-10
Re-authenticating an 802.1X Port .................................................................37-10
Initializing an 802.1X Port ............................................................................37-11
Configuring Accounting for 802.1X ....................................................................37-11
Verifying the 802.1X Port Configuration ...................................................................37-12
Chapter 38 Managing Policy Servers .......................................................................................38-1
In This Chapter ..............................................................................................................38-1
Policy Server Specifications .........................................................................................38-2
Policy Server Defaults ...................................................................................................38-2
Policy Server Overview ................................................................................................38-3
Installing the LDAP Policy Server ................................................................................38-3
Modifying Policy Servers .............................................................................................38-4
Modifying LDAP Policy Server Parameters ..........................................................38-4
Disabling the Policy Server From Downloading Policies ......................................38-4
Modifying the Port Number ...................................................................................38-5
Modifying the Policy Server Username and Password ..........................................38-5
Modifying the Searchbase ......................................................................................38-5
Configuring a Secure Socket Layer for a Policy Server ........................................38-6
Loading Policies From an LDAP Server ................................................................38-6
Removing LDAP Policies From the Switch ..........................................................38-6
Interaction With CLI Policies ................................................................................38-7
Verifying the Policy Server Configuration ...................................................................38-7