EasyManua.ls Logo

HP ProCurve 6200yl Series

HP ProCurve 6200yl Series
390 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
10
Configuring Port-Based and
Client-Based Access Control (802.1X)
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
Why Use Port-Based or Client-Based Access Control? . . . . . . . . . . . 10-3
General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4
802.1X Client-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . 10-4
802.1X Port-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 10-5
Alternative To Using a RADIUS Server . . . . . . . . . . . . . . . . . . . . . 10-6
Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6
General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . 10-9
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 10-9
VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12
General Setup Procedure for 802.1X Access Control . . . . . . . . . . 10-14
Do These Steps Before You Configure 802.1X Operation . . . . . . . . 10-14
Overview: Configuring 802.1X Authentication on the Switch . . . . . 10-15
Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . 10-16
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 10-17
A. Enable the Selected Ports as Authenticators and Enable
the (Default) Port-Based Authentication . . . . . . . . . . . . . . . 10-17
B. Specify Client-Based or Return to Port-Based 802.1X
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-18
Example: Configuring Client-Based 802.1X Authentication . . . 10-19
Example: Configuring Port-Based 802.1X Authentication . . . . 10-19
2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . . 10-19
10-1

Table of Contents

Related product manuals