Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 Configuration Manual page 108

Nsm configuration guide for ex series devices
Table of Contents

Advertisement

Table 57: 802/1X Authentication for an Interface
Option
Function
Authentication Profile
Specifies the name for the profile.
Name
Interface
Specifies the interface for which 802.1X authentication is
being configured.
Name
Specifies the interface name.
Disable
Disables 802.1X authentication on the interface.
Supplicant
Specifies the mode to be adopted for supplicants:
Retries
Maximum number of retries
Quiet Period
Specifies the port waiting time after an authentication
failure.
Transmit Period
Specifies the retransmit interval.
Supplicant Timeout
Port timeout value for the response from the supplicant.
Server Timeout
Port timeout value for the response from the RADIUS server
Maximum Requests
Specifies the maximum number of authentication requests
to be made to the server.
Guest Vlan
Specifies the guest VLAN to move the interface to in case
of an authentication failure.
Reauthentication
Specifies enabling reauthentication on the selected
interface.
92
NOTE: After you make changes to a device configuration, you must push that
updated device configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Single — allows only one host for authentication.
Multiple — allows multiple hosts for authentication. Each
host is checked before being admitted to the network.
Single authentication for multiple hosts — Allows multiple
hosts but only the first is authenticated.
Your Action
Enter the name
Select Interface.
Click the Add icon.
Enter the interface name.
Select to disable authentication.
Select the required mode.
Select a value from the list.
Select a value from the list.
Select a value from the list.
Select a value from the list.
Select a value from the list.
Select a value from the list.
Enter the VLAN name.
Select Reauthentication.
Select one:
none
reauthentication
no-reauthentication
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents