HP ProCurve 2510G Series Manual page 234

Access security guide
Hide thumbs Also See for ProCurve 2510G Series:
Table of Contents

Advertisement

Configuring Port-Based and Client-Based Access Control (802.1X)
802.1X Open VLAN Mode
8-36
2.
Configure the 802.1X authentication type. Options include:
Syntax:
aaa authentication port-access < local | eap-radius | chap-radius >
Determines the type of RADIUS authentication to use.
local: Use the switch's local username and password for
supplicant authentication (the default).
eap-radiusUse EAP-RADIUS authentication. (Refer to the
documentation for your RADIUS server.)
chap-radiusUse CHAP-RADIUS (MD5) authentication.
(Refer to the documentation for your RADIUS server
software.)
3.
If you selected either eap-radius or chap-radius for step 2, use the radius
host command to configure up to three RADIUS server IP address(es) on
the switch.
Syntax:
radius host < ip-address >
Adds a server to the RADIUS configuration.
[key < server-specific key-string >]
Optional. Specifies an encryption key for use with the
specified server. This key must match the key used on
the RADIUS server. Use this option only if the specified
server requires a different key than configured for the
global encryption key.
radius-server key < global key-string >
Specifies the global encryption key the switch uses for
sessions with servers for which the switch does not
have a server-specific key. This key is optional if all
RADIUS server addresses configured in the switch
include a server- specific encryption key.
4.
Activate authentication on the switch.
Syntax:
aaa port-access authenticator active
Activates 802.1X port-access on ports you have config-
ured as authenticators.
5.
Test both the authorized and unauthorized access to your system to
ensure that the 802.1X authentication works properly on the ports you
have configured for port-access.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents