Access Security Guide K/KA/KB.15.15

Specifying the time period enforced for implicit logoff........................................................76
Specifying how many authentication attempts can time-out before failure..............................76
Specifying how long the switch waits before processing a request from a MAC address that
failed authentication......................................................................................................76
Specifying time period enforced on a client to re-authenticate.............................................76
Forcing re-authentication of clients...................................................................................77
Specifying the period to wait for a server response to an authentication request.....................77
Specifying the VLAN to use when authentication fails.........................................................77
Configuring custom messages for failed logins..................................................................77
access-denied-str......................................................................................................77
radius-response........................................................................................................77
Web page display of access denied message..................................................................78
Redirecting HTTP when MAC address not found................................................................80
How HTTP redirect works...........................................................................................80
Operating Notes for HTTP Redirect.............................................................................80
Registering HTTP redirect................................................................................................80
Using the restrictive-filter option.......................................................................................82
Reauthenticating a MAC Authenticated client....................................................................83
Using SNMP............................................................................................................83
Using the CLI...........................................................................................................83
Configuring the registration server URL.............................................................................83
Unconfiguring a MAC Authenticated registration server......................................................83
Configuring web-based authentication.......................................................................................83
Preparation for web-based authentication..............................................................................83
Configuration commands for web-based authentication...........................................................84
Controlled directions......................................................................................................84
Disable web-based authentication...................................................................................85
Specifying the VLAN.....................................................................................................85
Clearing statistics..........................................................................................................86
Maximum authenticated clients.......................................................................................86
Specifies base address...................................................................................................86
Specifies lease length....................................................................................................86
Configures web server connection...................................................................................86
Specifying the period.....................................................................................................87
Specifying the number of authentication attempts...............................................................87
Specifying maximum retries............................................................................................87
Specifying the time period..............................................................................................87
Specifying the re-authentication period.............................................................................88
Specifying a forced reauthentication................................................................................88
Specifying the URL........................................................................................................88
Specifying the timeout....................................................................................................88
Configuring the RADIUS server to support MAC authentification...............................................88
Configuring the switch to access a RADIUS server..................................................................89
Customizing...........................................................................................................................90
Customizing user login web pages.......................................................................................90
Implementing customized web-based authentication pages.................................................91
Customizing HTML templates...............................................................................................91
Viewing.................................................................................................................................91
Viewing the status and settings of ports enabled for web-based authentication...........................91
Viewing status of ports enabled for web-based authentication.............................................91
Viewing session details for web-Auth clients......................................................................92
Viewing status details of web-based authentication sessions on specified ports......................92
Viewing web-based authentication settings for ports...........................................................93
Viewing details of web-based authentication settings for ports.............................................93
Viewing web-based authentication settings for ports, including RADIUS server specific...........94
6 Contents