for port-level security on secure Ethernet switches; when a unit is
connected to a secure port, no traffic is allowed until the identity of the
unit is authenticated.
ï‚§ [0] Disabled (default)
ï‚§ [1] EAP-MD5 = Authentication is performed using a user name and
password configured by the parameters 802.1xUsername and
802.1xPassword.
ï‚§ [2] Protected EAP = Authen
and password configured by the parameters 802.1xUsername and
802.1xPassword. In addition, the protocol used is MSCHAPv2 over
an encrypted TLS tunnel.
ï‚§ [3] EAP-TLS = The device's certificate is used to establish a
mutually-authenticated TLS session with the Access Server. This
requires prior configuration of the server certificate and root CA
(see Configuring the Certificates on page 95). The parameter
802.1xUsername is used to identify the device, however
802.1xPassword is ignored.
Note: The configured mode must match the configuration of the
Access server (e.g., RADIUS server).
Web: 802.1x Username
EMS: User Name
[802.1xUsername]
Defines the username for IEEE 802.1x support.
The valid value is a string of up to 32 characters. The default is an
empty string.
Web: 802.1x Password
EMS: Password
[802.1xPassword]
Defines the password for IEEE 802.1x support.
The valid value is a string of up to 32 characters. The default is an
empty string.
Web: 802.1x Verify Peer
Certificate
EMS: Verify Peer Certificate
[802.1xVerifyPeerCertificate]
Determines whether the device verifies the Peer Certificate for IEEE
802.1x support.
ï‚§ [0] Disable (default)
ï‚§ [1] Enable
43.4.8 OCSP Parameters
The Online Certificate Status Protocol (OCSP) parameters are described in the table
below.
Table 43-27: OCSP Parameters
Parameter Description
Web: Enable OCSP Server
EMS: OCSP Enable
[OCSPEnable]
Enables or disables certificate checking using OCSP.
ï‚§ [0] Disable (default)
ï‚§ [1] Enable