check chapter 7 in the security guide
------------------------------
If my post was useful accept solution and/or give kudos.
Any opinions expressed here are solely my own and not necessarily that of HPE or Aruba.
------------------------------
Original Message:
Sent: Nov 19, 2023 08:28 AM
From: Holger Hasenaug
Subject: 802.1X Bypass?
The feature you are looking for is called "Local MAC Authentication (LMA)" and can be found in the "Aruba 2920 Access Security Guide for AOS-S Switch 16.10".
Original Message:
Sent: Nov 17, 2023 11:52 AM
From: JamesITK
Subject: 802.1X Bypass?
Hello all,
Done a lot of searching and cant seem to find what i'm looking for.
I have an Aruba 2920 switch and have this setup and configured for 802.1X. I have specific devices in my environment that i'd like to bypass this on an 802.1X enabled port.
My setup on a port is as follows:
aaa port-access authenticator 1/4
aaa port-access authenticator 1/4 client-limit 2
aaa port-access authenticator 1/4 tx-period 10
aaa port-access authenticator 1/4 server-timeout 10
aaa port-access authenticator 1/4 max-requests 5
aaa port-access authenticator 1/4 reauth-period 3600
aaa port-access authenticator 1/4 unauth-period 10
aaa port-access mac-based 1/4
aaa port-access mac-based 1/4 addr-limit 2
aaa port-access mac-based 1/4 max-requests 5
aaa port-access mac-based 1/4 reauth-period 3600
aaa port-access mac-based 1/4 unauth-period 10
aaa port-access mac-based 1/4 unauth-vid 70
aaa port-access 1/4 controlled-direction in
How do i configure a specific mac address to bypass this and not be chucked in the unauth vlan?
Thanks
James