Configuring Port-Based And Client-Based Access Control (802.1X); Contents - HP ProCurve 2810 Series Access Security Manual

Hide thumbs Also See for ProCurve 2810 Series:
Table of Contents

Advertisement

Configuring Port-Based and Client-Based
Access Control (802.1X)

Contents

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
Switch-Port Supplicant Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-10
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-11
General Setup Procedure for 802.1X Access Control . . . . . . . . . . . . . . . . 8-13
Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . . . . . . . 8-16
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . . 8-16
2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . . . 8-19
3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . . . . 8-22
4. Enter the RADIUS Host IP Address(es) . . . . . . . . . . . . . . . . . . . . . . 8-23
5. Enable 802.1X Authentication on the Switch . . . . . . . . . . . . . . . . . 8-23
6. Optionally Resetting Authenticator Operation . . . . . . . . . . . . . . . . 8-24
802.1X Open VLAN Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-25
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-25
VLAN Membership Priorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26
Use Models for 802.1X Open VLAN Modes . . . . . . . . . . . . . . . . . . . . . 8-27
Unauthorized-Client VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-30
8
8-1

Advertisement

Table of Contents
loading

Table of Contents