How Radius/802.1X Authentication Affects Vlan Operation - HP 2600 Series Function Manual

Access security guide procurve 2600, 2600-pwr, 2800, 4100, 6108 series
Hide thumbs Also See for 2600 Series:
Table of Contents

Advertisement

Configuring Port-Based Access Control (802.1X)

How RADIUS/802.1X Authentication Affects VLAN Operation

8-44
supplicant port to another without clearing the statistics data from the first
port, the authenticator's MAC address will appear in the supplicant statistics
for both ports.
How RADIUS/802.1X Authentication
Affects VLAN Operation
Static VLAN Requirement. RADIUS authentication for an 802.1X client on
a given port can include a (static) VLAN requirement. (Refer to the documen-
tation provided with your RADIUS application.) The static VLAN to which a
RADIUS server assigns a client must already exist on the switch. If it does not
exist or is a dynamic VLAN (created by GVRP), authentication fails. Also, for
the session to proceed, the port must be an untagged member of the required
VLAN. If it is not, the switch temporarily reassigns the port as described below.
If the Port Used by the Client Is Not Configured as an Untagged
Member of the Required Static VLAN: When a client is authenticated on
port "N", if port "N" is not already configured as an untagged member of the
static VLAN specified by the RADIUS server, then the switch temporarily
assigns port "N" as an untagged member of the required VLAN (for the duration
of the 802.1X session). At the same time, if port "N" is already configured as
an untagged member of another VLAN, port "N" loses access to that other
VLAN for the duration of the session. (This is because a port can be an
untagged member of only one VLAN at a time.)

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents