ProCurve 6200yl User's Guide Page 17

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 16
xv
Using Named Source-Port Filters . . . . . . . . . . . . . . . . . . . . . . . . . 12-9
Static Multicast Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-15
Protocol Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-16
Configuring Traffic/Security Filters . . . . . . . . . . . . . . . . . . . . . . . . . . 12-17
Configuring a Source-Port Traffic Filter . . . . . . . . . . . . . . . . . . . . . . 12-18
Example of Creating a Source-Port Filter . . . . . . . . . . . . . . . . . . 12-19
Configuring a Filter on a Port Trunk . . . . . . . . . . . . . . . . . . . . . . 12-19
Editing a Source-Port Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-20
Configuring a Multicast or Protocol Traffic Filter . . . . . . . . . . . . . . 12-21
Filter Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-22
Displaying Traffic/Security Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-23
13 Configuring Port-Based and
User-Based Access Control (802.1X)
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-3
Why Use Port-Based or User-Based Access Control? . . . . . . . . . . . . 13-3
General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-3
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-4
802.1X User-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 13-4
802.1X Port-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 13-5
Alternative To Using a RADIUS Server . . . . . . . . . . . . . . . . . . . . . 13-6
Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-6
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-6
General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . 13-9
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 13-9
VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-10
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 13-12
General Setup Procedure for 802.1X Access Control . . . . . . . . . . 13-14
Do These Steps Before You Configure 802.1X Operation . . . . . . . . 13-14
Overview: Configuring 802.1X Authentication on the Switch . . . . . 13-15
Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . 13-16
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 13-17
Page view 16
1 2 ... 12 13 14 15 16 17 18 19 20 21 22 ... 595 596

Comments to this Manuals

No comments