EasyManua.ls Logo

HPE OfficeConnect 1950 Series

HPE OfficeConnect 1950 Series
182 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
122
3. Repeat step 1 and 2 on Device B to verify that the static IPv4 source guard entries are
configured successfully.
802.1X RADIUS authentication configuration example
Network requirements
As shown in Figure 41, configure the switch to meet the following requirements:
Use the RADIUS server to perform authentication, authorization, and accounting for 802.1X
users.
Authenticate all 802.1X users who access the switch through GigabitEthernet 1/0/1 in ISP
domain dm1X.
Use MAC-based access control on GigabitEthernet 1/0/1 to authenticate all 802.1X users on
the port separately.
Exclude domain names from the usernames sent to the RADIUS server.
Use name as the authentication and accounting shared keys for secure RADIUS
communication between the switch and the RADIUS server.
Use ports 1812 and 1813 for authentication and accounting, respectively.
Figure 41 Network diagram
Configuration procedure
1. Configure IP addresses for the interfaces, as shown in Figure 38. (Details not shown.)
2. Configure a RADIUS scheme on the switch:
a. From the navigation tree, select Security > Authentication > RADIUS.
b. Add RADIUS scheme 802.1X.
c. Configure the primary authentication server:
Set the IP address to 10.1.1.1.
Set the authentication port number to 1812.
Set the shared key to name.
Set the server state to Active.
d. Configure the primary accounting server:
Set the IP address to 10.1.1.1.
Set the accounting port number to 1813.
Set the shared key to name.
Set the server state to Active.

Table of Contents

Other manuals for HPE OfficeConnect 1950 Series

Related product manuals