HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 91

Setting the port authorization state

Page 91 highlights

Step 2. Configure EAP relay or EAP termination. Command dot1x authentication-method { chap | eap | pap } Remarks Optional. By default, the network access device performs EAP termination and uses CHAP to communicate with the RADIUS server. Specify the eap keyword to enable EAP termination. Specify the chap or pap keyword to enable CHAP-enabled or PAP-enabled EAP relay. NOTE: If EAP relay mode is used, the user-name-format command configured in RADIUS scheme view does not take effect. The access device sends the authentication data from the client to the server without any modification. Setting the port authorization state The port authorization state determines whether the client is granted access to the network. You can control the authorization state of a port by using the dot1x port-control command and the following keywords: • authorized-force-Places the port in the authorized state, enabling users on the port to access the network without authentication. • unauthorized-force-Places the port in the unauthorized state, denying any access requests from users on the port. • auto-Places the port initially in the unauthorized state to allow only EAPOL packets to pass, and after a user passes authentication, sets the port in the authorized state to allow access to the network. You can use this option in most scenarios. You can set authorization state for one port in Ethernet interface view, or for multiple ports in system view. If different authorization state is set for a port in system view and Ethernet interface view, the one set later takes effect. To set the authorization state of a port: Step 1. Enter system view. 2. Set the port authorization state. Command system-view • (Approach 1) In system view: dot1x port-control { authorized-force | auto | unauthorized-force } [ interface interface-list ] • (Approach 2) In Ethernet interface view: a. interface interface-type interface-number b. dot1x port-control { authorized-force | auto | unauthorized-force } Remarks N/A Optional. Use either approach. By default, auto applies. 81

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

81
Step
Command
Remarks
2.
Configure EAP relay or
EAP termination.
dot1x
authentication-method
{
chap
|
eap
|
pap
}
Optional.
By default, the network access device
performs EAP termination and uses CHAP to
communicate with the RADIUS server.
Specify the
eap
keyword to enable EAP
termination.
Specify the
chap
or
pap
keyword to enable
CHAP-enabled or PAP-enabled EAP relay.
NOTE:
If EAP relay mode is used, the
user-name-format
command configured in RADIUS scheme view does not
take effect. The access device sends the authentication data from the client to the server without any
modification.
Setting the port authorization state
The port authorization state determines whether the client is granted access to the network. You can
control the authorization state of a port by using the
dot1x port-control
command and the following
keywords:
authorized-force
—Places the port in the authorized state, enabling users on the port to access the
network without authentication.
unauthorized-force
—Places the port in the unauthorized state, denying any access requests from
users on the port.
auto
—Places the port initially in the unauthorized state to allow only EAPOL packets to pass, and
after a user passes authentication, sets the port in the authorized state to allow access to the network.
You can use this option in most scenarios.
You can set authorization state for one port in Ethernet interface view, or for multiple ports in system view.
If different authorization state is set for a port in system view and Ethernet interface view, the one set later
takes effect.
To set the authorization state of a port:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Set the port
authorization state.
(Approach 1) In system view:
dot1x port-control
{
authorized-force
|
auto
|
unauthorized-force
} [
interface
interface-list
]
(Approach 2) In Ethernet interface view:
a.
interface
interface-type
interface-number
b.
dot1x port-control
{
authorized-force
|
auto
|
unauthorized-force
}
Optional.
Use either approach.
By default,
auto
applies.