ProCurve Series 2300 and 2500 Switches Release Notes

46
Enhancements in Release F.05.xx
Configuring Port-Based Access Control (802.1x)
Note on Blocking a Non-802.1x Device
If the port’s 802.1x authenticator control mode is configured to authorized (as shown below, instead
of auto), then the first source MAC address from any device, whether 802.1x-aware or not, becomes
the only authorized device on the port.
aaa port-access authenticator < port-list > control authorized
With 802.1x authentication disabled on a port or set to authorized (Force Authorize), the port may
learn a MAC address that you don’t want authorized. If this occurs, you can block access by the
unauthorized, non-802.1x device by using one of the following options:
If 802.1x authentication is disabled on the port, use these command syntaxes to enable it and
allow only an 802.1x-aware device:
If 802.1x authentication is enabled on the port, but set to authorized (Force Authorized), use this
command syntax to allow only an 802.1x-aware
device:
aaa port-access authenticator e < port-list >
Enables 802.1x authentication on the port.
aaa port-access authenticator e < port-list > control auto
Forces the port to accept only a device that supports 802.1x
and supplies valid credentials.
aaa port-access authenticator e < port-list > control auto
Forces the port to accept only a device that supports 802.1x
and supplies valid credentials.