![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/1/46/14651ff9-768d-4b79-9311-420a5abc824b/14651ff9-768d-4b79-9311-420a5abc824b-bg1d.png)
active
■ [no] aaa port-access authenticator active
Activate/deactivate 802.1X authenticator.
addr-format
■ aaa port-access mac-based addr-format < no-delimiter | single-dash | multi-dash | ... >
Set the MAC address format to be used in the RADIUS request message (default
no-delimiter).
Supported Values:
■ no-delimiter -- no delimiter format: aabbccddeeff.
■ single-dash -- single dash format: aabbcc-ddeeff.
■ multi-dash -- multi-dash format: aa-bb-cc-dd-ee-ff.
■ multi-colon -- multi-colon format: aa:bb:cc:dd:ee:ff.
■ no-delimiter-uppercase -- no delimiter, uppercase format: AABBCCDDEEFF.
■ single-dash-uppercase -- single dash, uppercase format: AABBCC-DDEEFF.
■ multi-dash-uppercase -- multi-dash, uppercase format: AA-BB-CC-DD-EE-FF.
■ multi-colon-uppercase -- multi-colon, uppercase format: AA:BB:CC:DD:EE:FF.
addr-limit
■ aaa port-access mac-based [ETHERNET] PORT-LIST addr-limit < 1 to 32 >
Set the port's maximum number of authenticated MAC addresses (default 1).
Range: < 1 to 32 >
addr-moves
■ [no] aaa port-access mac-based [ETHERNET] PORT-LIST addr-moves
Set whether the MAC can move between ports (default disabled - no moves).
authentication
■ aaa authentication
Usage: aaa authentication ...
Description: Congure authentication parameters on the switch.
The command congures authentication mechanism used to
control access the switch resources. Use 'aaa authentication ?'
command to see a list of all possible conguration options.
Next Available Options:
■ console -- Configure authentication mechanism used to control access to the switch console(p.
32)
■ telnet -- Configure authentication mechanism used to control telnet access to the switch(p.
52)
■ web -- Configure authentication mechanism used to control web access to the switch(p. 54)
■ ssh -- Configure authentication mechanism used to control SSH access to the switch(p. 50)
■ port-access -- Configure authentication mechanism used to control access to the network(p.
42)
27© 2009 Hewlett-Packard Development Company, L.P.
aaaCommand Line Interface Reference Guide