HP 5920 Series Configuration Manual page 4

Hide thumbs Also See for 5920 Series:
Table of Contents

Advertisement

802.1X client as the initiator································································································································ 60
Access device as the initiator ······························································································································· 61
802.1X authentication procedures ······························································································································ 61
A comparison of EAP relay and EAP termination ······························································································ 61
EAP relay ································································································································································ 62
EAP termination ····················································································································································· 63
Configuring 802.1X ·················································································································································· 65
HP implementation of 802.1X ······································································································································ 65
Configuration prerequisites ··········································································································································· 65
802.1X configuration task list ······································································································································· 65
Enabling 802.1X ···························································································································································· 66
Enabling EAP relay or EAP termination ······················································································································· 66
Setting the port authorization state ······························································································································ 67
Specifying an access control method ·························································································································· 67
Setting the maximum number of concurrent 802.1X users on a port ······································································· 67
Setting the maximum number of authentication request attempts ············································································· 68
Setting the 802.1X authentication timeout timers ······································································································· 68
Configuring the online user handshake function ········································································································ 69
Configuring the authentication trigger function ·········································································································· 69
Configuration guidelines ······································································································································ 69
Configuration procedure ······································································································································ 70
Specifying a mandatory authentication domain on a port ························································································ 70
Configuring the quiet timer ··········································································································································· 70
Enabling the periodic online user re-authentication function ····················································································· 71
Displaying and maintaining 802.1X ··························································································································· 71
802.1X authentication configuration example ··········································································································· 71
Network requirements ··········································································································································· 71
Configuration procedure ······································································································································ 72
Verifying the configuration ··································································································································· 73
Configuring MAC authentication ······························································································································ 74
Overview ········································································································································································· 74
User account policies ············································································································································ 74
Authentication approaches ·································································································································· 74
Configuration prerequisites ··········································································································································· 75
Configuration task list ···················································································································································· 75
Enabling MAC authentication ······································································································································ 75
Specifying a MAC authentication domain ·················································································································· 76
Configuring the user account format ···························································································································· 76
Configuring MAC authentication timers ······················································································································ 76
Setting the maximum number of concurrent MAC authentication users on a port ·················································· 77
Displaying and maintaining MAC authentication ······································································································ 77
Local MAC authentication configuration example ····································································································· 78
Network requirements ··········································································································································· 78
Configuration procedure ······································································································································ 78
Verifying the configuration ··································································································································· 79
RADIUS-based MAC authentication configuration example ····················································································· 79
Network requirements ··········································································································································· 79
Configuration procedure ······································································································································ 80
Verifying the configuration ··································································································································· 81
Configuring port security ··········································································································································· 82
Overview ········································································································································································· 82
Port security features ············································································································································· 82
Port security modes ··············································································································································· 82
ii
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

This manual is also suitable for:

5900 series

Table of Contents