802.1x Client Version Checking Configuration
401
When the Guest VLAN function is enabled:
■
The switch broadcasts active authentication packets to all 802.1x-enabled ports.
■
The switch adds the ports that do not return response packets to Guest VLAN
When the maximum number of authentication retries is reached.
■
Users belonging to the Guest VLAN can access the resources of the Guest VLAN
without being authenticated. But they need to be authenticated before accessing
external resources.
Prerequisites
■
The ports operate in port-based authentication mode.
■
The VLAN specified to be the Guest VLAN already exists.
Guest VLAN
Configuration
Configuring Guest VLAN in system view
Configure Guest VLAN in
Ethernet port view
The Guest VLAN function is available only when the switch operates in the port-based
authentication mode.
Only one Guest VLAN can be configured for a switch.
Supplicant systems that are not authenticated, fail to pass the authentication, or are
offline belong to Guest VLANs.
Guest VLAN
Configuration Example
Network requirements
■
Create VLAN 2.
■
Configure Ethernet1/0/1 port to operate in port-based authentication mode.
■
Configure Guest VLAN for Ethernet1/0/1 port.
Table 426
Configure Guest VLAN in system view
Operation
Command
Description
Enter system view
system-view
—
Configure Guest VLAN
for specified ports
dot1x guest-vlan
vlan-id
[
interface
interface-list
]
Required
This operation applies to all ports
of the switch if you do not provide
the
interface-list
argument. And if
you specify the
interface-list
argument, the operation applies to
the specified Ethernet ports.
Table 427
Configure Guest VLAN in Ethernet port view
Operation
Command
Description
Enter system view
system-view
—
Enter Ethernet port view
interface
interface-type
interface-num
—
Configure Guest VLAN
for the port
dot1x guest-vlan
vlan-id
Required
This operation configures Guest
VLAN for the current port only.
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...