EasyManua.ls Logo

Extreme Networks ExtremeWare XOS Guide - Configuring Network Login

Extreme Networks ExtremeWare XOS Guide
698 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring Network Login
ExtremeWare XOS 11.3 Concepts Guide
349
NOTE
If you use 802.1x network login, authenticated clients remain authenticated during failover; however, shortly after
failover, all authenticated clients automatically re-authenticate themselves. Re-authentication occurs without user
intervention.
If failover occurs during the authentication or re-authentication of a client, the client must repeat the
authentication process.
To initiate hitless MSM failover on a network that uses network login:
1 Confirm that the MSMs are synchronized and have identical software and switch configurations
using the
show switch {detail} command. The output displays the status of the MSMs, with the
primary MSM showing
MASTER and the backup MSM showing BACKUP (InSync).
If the MSMs are not synchronized, proceed to step 2.
If the MSMs are synchronized, proceed to step 3.
2 If the MSMs are not in sync, replicate all saved images and configurations from the primary to the
backup using the
synchronize command.
3 Initiate failover using the
run msm-failover command.
For more detailed information about verifying the status of the MSMs and system redundancy, see
“Understanding System Redundancy with Dual MSMs Installed—Modular Switches Only” on page 70.
For more information about hitless failover, see “Understanding Hitless Failover Support—Modular
Switches Only” on page 74.
Configuring Network Login
This section provides a general overview of the commands used for:
Enabling or Disabling Network Login on the Switch on page 350
Enabling or Disabling Network Login on a Specific Port on page 350
Configuring the Move Fail Action on page 350
Displaying Network Login Settings on page 350
This section also contains information about the Exclusions and Limitations of network login.
For more detailed information about a specific mode of network login, including configuration
examples, please refer to the following sections:
802.1x Authentication on page 359
Web-Based Authentication on page 363
MAC-Based Authentication on page 368

Table of Contents

Related product manuals