Using The Built-In Nac 800 Radius Server For Authentication; Configuring Non-Hp Switches - HP 800 User Manual

Procurve network access controller 800
Hide thumbs Also See for 800:
Table of Contents

Advertisement

802.1X Quarantine Method
Setting up the 802.1X Components
11-36
4.
Test the RADIUS server proxy:
radtest <user> <passwd> <radius-server[:port]> <nas-
port-number><secret>

Using the Built-in NAC 800 RADIUS Server for Authentication

If you selected the Manual End-user authentication method in the Authentication
settings area of the System configuration>>Quarantining>>802.1X window, con-
figure NAC 800 according to the instructions in this section.
To configure NAC 800 to handle RADIUS requests:
Add users to the RADIUS server by modifying the /etc/raddb/users file.
Add user entries to the beginning of the file in the following format:
Clear text authentication:
<user name> Auth-Type := Local, User-Password =="pass-
word"
EAP, PEAP, or MD5-Challenge authentication (the built-in windows 802.1X
supplicant uses these methods):
<user name> Auth-Type := EAP, User-Password =="password"
For example:
dave Auth-Type := EAP, User-Password =="d@9ij8!e"

Configuring Non-HP Switches

If you have an HP appliance and non-HP switches, you will need to add these
sections to the .conf (for FreeRADIUS) or .ini files (for IAS).
To configure for non-HP switches:
Configure the SAFreeRadiusConnector.conf file with the appropriate
radius attributes and VLANS. See comments in the sample file below for
instructions:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Procurve nac 800

Table of Contents