Avaya P3343T-ML 사용자 설명서

다운로드
페이지 178
Chapter 11        Avaya P330 Layer 2 Features
Avaya P334T-ML User’s Guide
89
will be blocked.
When PBNAC is activated, the application immediately places all ports in a 
blocking state unless they were declared “Force Authenticate”. They will be 
reverted to “Forwarding” state only when the port is authorized by the 
RADIUS server.
L The actual state of ports configured as “Force Authenticate” is determined by 
the STA.
Configuring the P330 for PBNAC
This section lists the basic tasks required to configure a P330 stack for PBNAC. To 
configure P330 for PBNAC, do the following:
Configure a RADIUS server on a network reachable from the P330:
— Create user names and passwords for allowed users. 
— Make sure the EAP option is enabled on this server. 
Configure the P330 for RADIUS:
— Configure RADIUS parameters. 
— Enable the RADIUS feature.
— Configure the port used to access the RADIUS server as “force-authorized.”
L You can configure on the RADIUS server a PVID, static VLAN binding and port 
level for each authenticated user. If the port that the user is connected to is 
authorized, those parameters will be assigned to the port.
Connect the Supplicant—i.e., Windows XP clients—directly to the P330.
Verify that the dot1x port-control is in auto mode.
Set the dot1x system-auth-config to enable; the authentication process starts:
— The supplicant is asked to supply a user name and password.
— If authentication is enabled on the port, the Authenticator initiates 
authentication when the link is up.
— Authentication Succeeds: after the authentication process completes, the 
supplicant will receive a Permit/Deny notification.
— Authentication Fails: authentication will fail when the Supplicant fails to 
respond to requests from the Authenticator, when management controls 
prevent the port from being authorized, when the link is down, or when the 
user supplied incorrect logon information.