HP 3600 v2 Series Security Configuration Manual page 4

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Access device as the initiator ······························································································································· 81
802.1X authentication procedures······························································································································· 81
A comparison of EAP relay and EAP termination ······························································································ 82
EAP relay ································································································································································ 82
EAP termination ····················································································································································· 84
802.1X configuration ················································································································································ 85
HP implementation of 802.1X ······································································································································ 85
Access control methods ········································································································································ 85
Using 802.1X authentication with other features ······························································································ 85
Configuring 802.1X ······················································································································································ 88
Configuration prerequisites ·································································································································· 88
802.1X configuration task list ······························································································································ 88
Enabling 802.1X ··················································································································································· 89
Enabling EAP relay or EAP termination ·············································································································· 89
Setting the port authorization state ······················································································································ 90
Specifying an access control method ·················································································································· 91
Setting the maximum number of concurrent 802.1X users on a port ······························································ 91
Setting the maximum number of authentication request attempts ···································································· 91
Setting the 802.1X authentication timeout timers ······························································································ 92
Configuring the online user handshake function································································································ 92
Configuring the authentication trigger function ································································································· 93
Specifying a mandatory authentication domain on a port ··············································································· 94
Configuring the quiet timer ··································································································································· 94
Enabling the periodic online user re-authentication function ············································································ 95
Configuring an 802.1X guest VLAN ··················································································································· 95
Configuring an Auth-Fail VLAN ··························································································································· 97
Specifying supported domain name delimiters ·································································································· 98
Displaying and maintaining 802.1X ··························································································································· 98
802.1X configuration examples ··································································································································· 98
802.1X authentication configuration example ·································································································· 98
802.1X with guest VLAN and VLAN assignment configuration example ····················································· 101
802.1X with ACL assignment configuration example ····················································································· 103
EAD fast deployment configuration ······················································································································· 106
EAD fast deployment overview ··································································································································· 106
EAD fast deployment implementation ··············································································································· 106
Configuring EAD fast deployment ······························································································································ 106
Configuration prerequisites ································································································································ 106
Configuration procedure ···································································································································· 106
Displaying and maintaining EAD fast deployment ··································································································· 108
EAD fast deployment configuration example ············································································································ 108
Troubleshooting EAD fast deployment ······················································································································· 110
Web browser users cannot be correctly redirected ························································································ 110
MAC authentication configuration ························································································································· 111
MAC authentication overview ···································································································································· 111
User account policies ·········································································································································· 111
Authentication approaches ································································································································ 111
MAC authentication timers ································································································································· 112
Using MAC authentication with other features ········································································································· 112
VLAN assignment ················································································································································ 112
ACL assignment ··················································································································································· 112
Guest VLAN ························································································································································· 112
MAC authentication configuration task list ··············································································································· 113
Basic configuration for MAC authentication ············································································································· 113
ii
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

A3100-48 v2

Table of Contents