ii
802.1X client as the initiator································································································································ 60
Access device as the initiator······························································································································· 61
802.1X authentication procedures ······························································································································ 61
A comparison of EAP relay and EAP termination······························································································ 61
EAP relay································································································································································ 62
EAP termination ····················································································································································· 63
Configuring 802.1X ··················································································································································65
HP implementation of 802.1X ······································································································································ 65
Configuration prerequisites··········································································································································· 65
802.1X configuration task list······································································································································· 65
Enabling 802.1X···························································································································································· 66
Enabling EAP relay or EAP termination······················································································································· 66
Setting the port authorization state ······························································································································ 67
Specifying an access control method ·························································································································· 67
Setting the maximum number of concurrent 802.1X users on a port······································································· 67
Setting the maximum number of authentication request attempts ············································································· 68
Setting the 802.1X authentication timeout timers······································································································· 68
Configuring the online user handshake function ········································································································ 69
Configuring the authentication trigger function ·········································································································· 69
Configuration guidelines ······································································································································ 69
Configuration procedure ······································································································································ 70
Specifying a mandatory authentication domain on a port························································································ 70
Configuring the quiet timer ··········································································································································· 70
Enabling the periodic online user re-authentication function····················································································· 71
Displaying and maintaining 802.1X ··························································································································· 71
802.1X authentication configuration example ··········································································································· 71
Network requirements··········································································································································· 71
Configuration procedure ······································································································································ 72
Verifying the configuration··································································································································· 73
Configuring MAC authentication······························································································································74
Overview········································································································································································· 74
User account policies············································································································································ 74
Authentication approaches ·································································································································· 74
Configuration prerequisites··········································································································································· 75
Configuration task list ···················································································································································· 75
Enabling MAC authentication ······································································································································ 75
Specifying a MAC authentication domain·················································································································· 76
Configuring the user account format···························································································································· 76
Configuring MAC authentication timers ······················································································································ 76
Setting the maximum number of concurrent MAC authentication users on a port·················································· 77
Displaying and maintaining MAC authentication ······································································································ 77
Local MAC authentication configuration example ····································································································· 78
Network requirements··········································································································································· 78
Configuration procedure ······································································································································ 78
Verifying the configuration··································································································································· 79
RADIUS-based MAC authentication configuration example ····················································································· 79
Network requirements··········································································································································· 79
Configuration procedure ······································································································································ 80
Verifying the configuration··································································································································· 81
Configuring port security···········································································································································82
Overview········································································································································································· 82
Port security features ············································································································································· 82
Port security modes ··············································································································································· 82