This action clears any temporary error conditions that may have occurred and executes the switch self test. ■ Resetting the switch - When the switch is powered on. Indicates the Port LEDs are lit for ports that are providing PoE power to the if the Port LED is on continuously, the port is operating at 1000 Mbps.if the Port LED is flashing, the port is operating at 100 Mbps.Indicates the Port LEDs are displaying the connection speed at which each Indicates the Port LEDs are lit for ports that are in full-duplex mode. if the Port LED is off, the port is operating at 10 Mbps.Click the balloon and enter your domain credentials.Indicates the Port LEDs are displaying network activity information.
Hp 2610 switch windows#
If using a non-domain joined computer and you have previously un-checked the tick box “Automatic use my Windows logon….” a balloon will appear “Additional information is needed to connect to this network”. The steps above can also be configured via Group Policy TestingĬonnect a computer to a port configured for authentication If the client computer is not joined to the domain and you wish to prompt for authentication, select “Configure” and un-check “Automatic use my Windows logon….” If you do have an internal CA and all client computers have the root CA in the computer certificate store leave checked. If the client computers do not have a trusted root certificate un-check the tick box “Validate server certificate”. Click “Change adapter settings”Ĭlick “Local Area Connection” > “Properties” > “Authentication”Įnsure “Enable IEEE 802.1x authentication” is tickedĮnsure “Microsoft: Protected EAP (PEAP)” is selected from the dropdown box. Open Windows services and change the startup type of the service “Wired AutoConfig” to Automatic. Click Finish Windows client computer configuration Click NextĬlick Next and make no further modifications. Un-tick “Microsoft Encrypted Authentication (MS-CHAP)”. Specify Authentication Method as “Microsoft: Protected EAP (PEAP). Specify Access Permissions, leave as “Access granted”. Specify conditions value e.g DOMAINNAME\Domain Users or DOMAINNAME\Domain Computers. In this instance the shared secret is secret12Ĭreate a Policy > Policies > Network Policiesĭefine a suitable policy name eg “Switch 802.1x Authentication”. NOTE – the shared secret is the same secret define previous when configuring the switch. Open the Network Policy Server MMC, define the switch as a new RADIUS Client > RADIUS Clients and Server > RADIUS Clientsĭefine a friendly name (can be anything), define the switch IP address and enter the “shared secret”. Install the server role Network Policy and Access Services > Network Policy Server NOTE – VLAN 30 and VLAN 40 are not configured as either tagged or untagged, Open VLAN temporarily ignores the static port configure when using authorized and un-authorized VLANs.ĭefine RADIUS server IP address and shared secret radius-server host 192.168.20.20 key secret12Ĭonfigure 802.1x authentication type aaa authentication port-access eap-radiusĬonfigure ethernet ports 1-2 as authenticator ports aaa port-access authenticator 5Ĭonfigure ethernet ports 1-2 to use VLAN 30 as the “Authorized” VLAN aaa port-access authenticator 1-2 auth-vid 30Ĭonfigure ethernet ports 1-2 to use VLAN 30 as the “Un-Authorized” VLAN aaa port-access authenticator 1-2 unauth-vid 40Īctivates 802.1x port-access authentication on ports aaa port-access authenticator activeĬonfigure the maximum number of devices the defined ports is allowed to authenticate aaa port-access authenticator 1-2 client-limit 1 Windows 20008 R2 NPS (RADIUS) Configuration