HP 6120XG HP ProCurve Series 6120 Blade Switches Access Security Guide - Page 28
Security Overview, 1X Access, Control, Web and MAC, Authentication, Feature, Default, Setting
View all HP 6120XG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 28 highlights
Security Overview Access Security Features Feature 802.1X Access Control Default Setting none Web and MAC none Authentication Security Guidelines More Information and Configuration Details This feature provides port-based or user-based Chapter 13 "Configuring authentication through a RADIUS server to protect the Port-Based and User-Based switch from unauthorized access and to enable the use Access Control (802.1X)" of RADIUS-based user profiles to control client access to network services. Included in the general features are the following: • user-based access control supporting up to 32 authenticated clients per port • port-based access control allowing authentication by a single client to open the port • switch operation as a supplicant for point-to-point connections to other 802.1X-compliant ProCurve switches These options are designed for application on the edge Chapter 4, "Web and MAC of a network to provide port-based security measures Authentication" for protecting private networks and the switch itself from unauthorized access. Because neither method requires clients to run any special supplicant software, both are suitable for legacy systems and temporary access situations where introducing supplicant software is not an attractive option. Both methods rely on using a RADIUS server for authentication. This simplifies access security management by allowing you to control access from a master database in a single server. It also means the same credentials can be used for authentication, regardless of which switch or switch port is the current access point into the LAN. Web authentication uses a web page login to authenticate users for access to the network. MAC authentication grants access to a secure network by authenticating device MAC addresses for access to the network. 1-6