HP ProCurve 2510G Series Manual page 235

Access security guide
Hide thumbs Also See for ProCurve 2510G Series:
Table of Contents

Advertisement

Note
If you want to implement the optional port security feature on the switch, you
should first ensure that the ports you have configured as 802.1X authenticators
operate as expected. Then refer to "Option For Authenticator Ports: Configure
Port-Security To Allow Only 802.1X Devices" on page 8-40.
After you complete steps 1 and 2, the configured ports are enabled for 802.1X
authentication (without VLAN operation), and you are ready to configure
VLAN Operation.
Configuring 802.1X Open VLAN Mode. Use these commands to actually
configure Open VLAN mode. For a listing of the steps needed to prepare the
switch for using Open VLAN mode, refer to "Preparation" on page 8-34.
Syntax:
aaa port-access authenticator [e] < port-list >
[auth-vid < vlan-id >]
Configures an existing, static VLAN to be the Authorized-
Client VLAN.
[< unauth-vid < vlan-id >]
Configures an existing, static VLAN to be the Unautho-
rized-Client VLAN.
For example, suppose you want to configure 802.1X port-access with Open
VLAN mode on ports A10 - A20 and:
These two static VLANs already exist on the switch:
Unauthorized, VID = 80
Authorized, VID = 81
Your RADIUS server has an IP address of 10.28.127.101. The server
uses rad4all as a server-specific key string. The server is connected to
a port on the Default VLAN.
Configuring Port-Based and Client-Based Access Control (802.1X)
802.1X Open VLAN Mode
8-37

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents