418
C
HAPTER
21: 802.1
X
C
ONFIGURATION
Network diagram
Figure 109
Network diagram for dynamic VLAN assignment
Configuration procedure
1
Create a RADIUS scheme.
[S5500]
radius scheme ias
[S5500-radius-ias]
primary authentication 1.11.1.1
[S5500-radius-ias]
primary accounting 1.11.1.1
[S5500-radius-ias]
key authentication hello
[S5500-radius-ias]
key accounting hello
[S5500-radius-ias]
quit
2
Create an ISP domain and reference the created RADIUS scheme in the domain.
[S5500]
domain ias
[S5500-isp-ias]
radius-scheme ias
3
Configure the VLAN assignment mode to string and return to the system view.
[S5500-isp-ias]
vlan-assignment-mode string
[S5500-isp-ias]
quit
4
Create a VLAN and specify a name for the VLAN.
[S5500]
vlan 100
5
Set the name of the assigned VLAN to test.
[S5500-vlan100]
name test
Creating a Local User
A local user is a group of users set on NAS. The user name is the unique identifier of a
user. A user requesting network service may use local authentication only if its
corresponding local user has been added onto NAS.
Perform the following configurations in System View
Table 446
Creating/Deleting a Local User and Relevant Properties
By default, there is no local user in the system.
Supplicant
Internet
Authenticator
Switch
Supplicant
Internet
Switch
RADIUS authentication servers
IP address: 1.11.1.1
Internet
Switch
Ethernet0/1
Supplicant
Internet
Authenticator
Switch
Supplicant
Supplicant
Internet
Authenticator
Switch
Supplicant
Internet
Switch
RADIUS authentication servers
IP address: 1.11.1.1
Internet
Switch
Ethernet0/1
Operation
Command
Add local users
local-user
user_name
Delete all the local users
undo local-user all
Delete a local user by specifying
its type
undo local-user {
user_name
| all [
service-type { lan_access | ftp | telnet | ssh
| terminal } ] }
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...