802.1X Configuration; Hp Implementation Of 802.1X; Access Control Methods; Using 802.1X Authentication With Other Features - HP 5120 SI Series Security Configuration Manual

Hide thumbs Also See for 5120 SI Series:
Table of Contents

Advertisement

802.1X configuration

This chapter describes how to configure 802.1X on an HP device. You can also configure the port security
feature to perform 802.1X. Port security combines and extends 802.1X and MAC authentication. It
applies to a network, for example, that requires different authentication methods for different users on a
port. Port security is beyond the scope of this chapter. It is described in the chapter "Port security
configuration."
This chapter includes these sections:

HP implementation of 802.1X

Configuring 802.1X
Displaying and maintaining 802.1X
802.1X configuration examples
HP implementation of 802.1X

Access control methods

HP implements port-based access control as defined in the 802.1X protocol, and extends the protocol to
support MAC-based access control.
With port-based access control, once an 802.1X user passes authentication on a port, any
subsequent user can access the network through the port without authentication. When the
authenticated user logs off, all other users are logged off.
With MAC-based access control, each user is separately authenticated on a port. When a user logs
off, no other online users are affected.
For more information about the fundamentals of 802.1X, see the chapter "802.1X fundamentals."

Using 802.1X authentication with other features

VLAN assignment
You can configure the authentication server to assign a VLAN for an 802.1X user that has passed
authentication. The way that the network access device handles VLANs on an 802.1X-enabled port
differs by 802.1X access control mode.
Access control
Port-based
VLAN manipulation
Assigns the VLAN to the port as the default VLAN. All subsequent 802.1X users
can access the default VLAN without authentication.
When the user logs off, the previous default VLAN restores, and all other online
users are logged off.
65

Advertisement

Table of Contents
loading

Table of Contents