EasyManua.ls Logo

ProCurve 2610 - Configuring RADIUS Server Support for Switch Services; Contents

ProCurve 2610
454 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
6
Configuring RADIUS Server Support
for Switch Services
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
Configuring the RADIUS Server for
Viewing the Currently Active Per-Port CoS
How a RADIUS Server Applies a Dynamic Port ACL
Configuring the Switch To Support Dynamic Port
Displaying the Current Dynamic Port ACL Activity
Causes of Client Deauthentication Immediately
CoS Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
Configuration Specified by a RADIUS Server . . . . . . . . . . . . . . . . . . . . 6-3
Configuring and Using RADIUS-Assigned Access Control Lists . . . . . . . . 6-6
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Overview of RADIUS-Assigned, Dynamic Port ACLs . . . . . . . . . . . . . . 6-9
Contrasting Dynamic and Static ACLs . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
to a Switch Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12
General ACL Features, Planning, and Configuration . . . . . . . . . . . . . 6-13
The Packet-filtering Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-14
Operating Rules for Dynamic Port ACLs . . . . . . . . . . . . . . . . . . . . . . . 6-14
Configuring an ACL in a RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . 6-15
Configuring ACE Syntax in RADIUS Servers . . . . . . . . . . . . . . . . . . . 6-18
ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-20
on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21
Event Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24
After Authenticating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-25
Monitoring Shared Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-25
6-1

Table of Contents

Related product manuals