Dot1X Auth-Fail Vlan - HP 5120 SI series Command Reference Manual

Hide thumbs Also See for 5120 SI series:
Table of Contents

Advertisement

Default level
2: System level
Parameters
chap: Sets the access device to perform Extensible Authentication Protocol (EAP) termination and use the
Challenge Handshake Authentication Protocol (CHAP) to communicate with the RADIUS server.
eap: Sets the access device to relay EAP packets.
pap: Sets the access device to perform EAP termination and use the Password Authentication Protocol
(PAP) to communicate with the RADIUS server.
Description
Use the dot1x authentication-method command to specify an EAP message handling method.
Use the undo dot1x authentication-method command to restore the default.
By default, the network access device performs EAP termination and uses CHAP to communicate with the
RADIUS server.
The network access device relays or terminates EAP packets:
1.
In EAP termination mode, the access device re-encapsulates and sends the authentication data
from the client in standard RADIUS packets to the RADIUS server, and performs either CHAP or
PAP authentication with the RADIUS server.
PAP transports usernames and passwords in clear text. The authentication method applies to
scenarios that do not require high security. To use PAP, the client must be an HP iNode 802.1X client.
CHAP transports username and encrypted password over the network. It is more secure than PAP.
In this mode the RADIUS server supports only MD5-Challenge.
2.
In EAP relay mode, the access device relays EAP messages between the client and the RADIUS
server. The EAP relay mode supports multiple EAP authentication methods, such as
MD5-Challenge, EAP-TL, and PEAP. To use this mode, you must ensure that the RADIUS server
supports the EAP-Message and Message-Authenticator attributes, and uses the same EAP
authentication method as the client. If this mode is used, the user-name-format command
configured in RADIUS scheme view does not take effect. For more information about the
user-name-format command, see the chapter "RADIUS configuration commands."
Local authentication supports PAP and CHAP.
If RADIUS authentication is used, you must configure the network access device to use the same
authentication method (PAP, CHAP, or EAP) as the RADIUS server.
Related commands: display dot1x.
Examples
# Enable the access device to terminate EAP packets and perform PAP authentication with the RADIUS
server.
<Sysname> system-view
[Sysname] dot1x authentication-method pap

dot1x auth-fail vlan

Syntax
dot1x auth-fail vlan authfail-vlan-id
96

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents