Configuring Port-Based and
User-Based Access Control (802.1X)
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Why Use Port-Based or User-Based Access Control? . . . . . . . . . . . . 12-3
General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
802.1X User-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Alternative To Using a RADIUS Server . . . . . . . . . . . . . . . . . . . . . 12-6
Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 12-9
Do These Steps Before You Configure 802.1X Operation . . . . . . . . 12-15
Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . 12-19
Example: Configuring User-Based 802.1X Authentication . . . . 12-22
Example: Configuring Port-Based 802.1X Authentication . . . . 12-22
12
12-1
Need help?
Do you have a question about the ProCurve 2910al and is the answer not in the manual?
Questions and answers