HP (Hewlett-Packard) 2300 Switch User Manual


 
34
Enhancements in Release F.05.05 through F.05.70
Enhancements in Release F.05.05 through F.05.60
EAP (Extensible Authentication Protocol): EAP enables network access that supports multiple
authentication methods.
EAPOL: Extensible Authentication Protocol Over LAN, as defined in the 802.1X standard.
Friendly Client: A client that does not pose a security risk if given access to the switch and your
network.
MD5: An algorithm for calculating a unique digital signature over a stream of bytes. It is used by
CHAP to perform authentication without revealing the shared secret (password).
PVID (Port VID): This is the VLAN ID for the untagged VLAN to which an 802.1X port belongs.
Static VLAN: A VLAN that has been configured as “permanent” on the switch by using the CLI vlan
< vid > command or the Menu interface.
Supplicant: The entity that must provide the proper credentials to the switch before receiving access
to the network. This is usually an end-user workstation, but it can be a switch, router, or another
device seeking network services.
Tagged VLAN Membership: Th is ty pe of VL AN me mb ersh ip allo ws a p ort t o b e a me mb er of mult ip le
VLANs simultaneously. If a client connected to the port has an software that supports 802.1q
VLAN tagging, then the client can access VLANs for which the port is a tagged member. If the
client does not support VLAN tagging, then it can access only a VLAN for which the port is an
untagged member. (A port can be an untagged member of only one VLAN at a time.) 802.1X Open
VLAN mode does not affect a port’s tagged VLAN access unless the port is statically configured
as a member of a VLAN that is also configured as the Unauthorized-Client or Authorized-Client
VLAN. See also “Untagged VLAN Membership”.
Unauthorized-Client VLAN: A conventional, static VLAN previously configured on the switch by
the System Administrator. It is used to provide access to a client prior to authentication. It should
be set up to allow an unauthenticated client to access only the initialization services necessary
to establish an authenticated connection, plus any other desirable services whose use by an
unauthenticated client poses no security threat to your network. (Note that an unauthenticated
client has access to all network resources that have membership in the VLAN you designate as
the Unauthorized-Client VLAN.) A port configured to use a given Unauthorized-Client VLAN does
not have to be statically configured as a member of that VLAN as long as at least one other port
on the switch is statically configured as a tagged or untagged member of the same Unauthorized-
Client VLAN.
Untagged VLAN Membership: A port can be an untagged member of only one VLAN. (In the factory-
default configuration, all ports on the switch are untagged members of the default VLAN.) An
untagged VLAN membership is required for a client that does not support 802.1q VLAN tagging.
A port can simultaneously have one untagged VLAN membership and multiple tagged VLAN
memberships. Depending on how you configure 802.1X Open VLAN mode for a port, a statically
configured, untagged VLAN membership may become unavailable while there is a client session
on the port. See also “Tagged VLAN Membership”.