User Authentication, Accounts, And Addressing - HP MSM7xx Management And Configuration Manual

Hide thumbs Also See for MSM7xx:
Table of Contents

Advertisement

Chapter 10: User authentication, accounts, and addressing
User authentication, accounts, and
addressing
Contents
Introduction ................................................................................................................10-3
802.1X authentication ................................................................................................10-8
MAC-based authentication......................................................................................10-14
HTML-based authentication....................................................................................10-22
VPN-based authentication.......................................................................................10-24
No authentication.....................................................................................................10-26
Authentication support.......................................................................................10-3
Other access control methods ...........................................................................10-5
User authentication limits ..................................................................................10-7
Supported 802.1X protocols ...............................................................................10-9
Configuring 802.1X support on a VSC.............................................................10-10
Configuring global 802.1X settings for wired users ......................................10-12
Configuring global 802.1X settings for wireless users ..................................10-13
Configuring 802.1X support on an MSM317 switch port ..............................10-14
Configuring global MAC-based authentication..............................................10-16
Configuring MAC-based authentication on a VSC.........................................10-17
Configuring MAC-based filters on a VSC........................................................10-19
Configuring HTML-based authentication on a VSC ......................................10-22
Configuring VPN-based authentication on a VSC..........................................10-24
10

Advertisement

Table of Contents
loading

Table of Contents