Configuration Prerequisites - HP FlexNetwork NJ5000 User Manual

5g poe+ walljack
Table of Contents

Advertisement

password. Users in the Auth-Fail VLAN can access a limited set of network resources, such as a
software server, to download anti-virus software and system patches.
The Auth-Fail VLAN does not accommodate 802.1X users that have failed authentication for
authentication timeouts or network connection problems. The way that the network access device
handles VLANs on the port differs by 802.1X access control mode.
On a port that performs port-based access control:
Authentication status
A user fails 802.1X
authentication.
A user in the Auth-Fail VLAN
fails 802.1X
re-authentication.
A user passes 802.1X
authentication.
On a port that performs MAC-based access control:
Authentication status
A user fails 802.1X
authentication.
A user in the Auth-Fail VLAN
fails 802.1X
re-authentication.
A user in the Auth-Fail VLAN
passes 802.1X
authentication.
To perform the 802.1X Auth-Fail VLAN function on a port that performs MAC-based access control,
you must ensure that the port is a hybrid port, and enable MAC-based VLAN on the port.
The network device assigns a hybrid port to an 802.1X Auth-Fail VLAN as an untagged member.
ACL assignment
You can specify an ACL for an 802.1X user to control its access to network resources. After the user
passes 802.1X authentication, the authentication server, either the local access device or a RADIUS
server, assigns the ACL to the port to filter the traffic from this user. In either case, you must configure
the ACL on the access device. You can change ACL rules while the user is online.

Configuration prerequisites

When you configure 802.1X, follow these restrictions and guidelines:
Configure an ISP domain and AAA scheme (local or RADIUS authentication) for 802.1X users.
For more information, see
If RADIUS authentication is used, create user accounts on the RADIUS server.
VLAN manipulation
The device assigns the Auth-Fail VLAN to the port as the PVID. All
802.1X users on this port can access only resources in the Auth-Fail
VLAN.
The Auth-Fail VLAN is still the PVID on the port, and all 802.1X users
on this port are in this VLAN.
The device assigns the VLAN specified for the user to the port as
the PVID, and removes the port from the Auth-Fail VLAN. After the
user logs off, the user-configured PVID restores.
If the authentication server assigns no VLAN, the initial PVID
applies. The user and all subsequent 802.1X users are assigned
to the user-configured PVID. After the user logs off, the PVID
remains unchanged.
VLAN manipulation
The device remaps the MAC address of the user to the Auth-Fail VLAN.
The user can access only resources in the Auth-Fail VLAN.
The user is still in the Auth-Fail VLAN.
The device remaps the MAC address of the user to the server-assigned
VLAN.
If the authentication server assigns no VLAN, remaps the MAC address
of the user to the initial PVID on the port.
"Configuring
AAA" and
261
"Configuring
RADIUS."

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents