150
1.877.877.2269
BLACKBOX.COM
NEED HELP?
LEAVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.877.877.2269
CHAPTER 10: SECURITY
Only the first occurrence of the attribute in the packet will be considered, and to be valid, it must follow this rule:
- All 8 octets in the attribute’s value must be identical and consist of ASCII characters in the range 0–7, which translates into the
desired QoS Class in the range [0; 7].
RADIUS-Assigned VLAN Enabled: When RADIUS-Assigned VLAN is both globally enabled and enabled (checked) for a given port,
the switch reacts to VLAN ID information carried in the RADIUS Access-Accept packet transmitted by the RADIUS server when a
supplicant is successfully authenticated. If present and valid, the port’s Port VLAN ID will be changed to this VLAN ID, the port will
be set to be a member of that VLAN ID, and the port will be forced into VLAN unaware mode. Once assigned, all traffic arriving on
the port will be classified and switched on the RADIUS-assigned VLAN ID.
If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a VLAN ID or it’s invalid, or the supplicant
is otherwise no longer present on the port, the port’s VLAN ID is immediately reverted to the original VLAN ID (which may be
changed by the administrator in the meanwhile without affecting the RADIUS-assigned).
This option is only available for single-client modes, i.e.
• Port-based 802.1X
• Single 802.1X
For troubleshooting VLAN assignments, use the “Monitor→VLANs→VLAN Membership and VLAN Port” pages. These pages show
which modules have (temporarily) overridden the current Port VLAN configuration.
RADIUS attributes used in identifying a VLAN ID:
RFC2868 and RFC3580 form the basis for the attributes used in identifying a VLAN ID in an Access-Accept packet. The following
criteria are used:
- The Tunnel-Medium-Type, Tunnel-Type, and Tunnel-Private-Group-ID attributes must all be present at least once in the Access-
Accept packet.
- The switch looks for the first set of these attributes that have the same Tag value and fulfil the following requirements (if Tag ==
0 is used, the Tunnel-Private-Group-ID does not need to include a Tag):
-- Value of Tunnel-Medium-Type must be set to “IEEE-802” (ordinal 6).
-- Value of Tunnel-Type must be set to “VLAN” (ordinal 13).
-- Value of Tunnel-Private-Group-ID must be a string of ASCII chars in the range 0–9, which is interpreted as a decimal string
representing the VLAN ID. Leading ‘0’s are discarded. The final value must be in the range [1; 4095].
Guest VLAN Enabled: When Guest VLAN is both globally enabled and enabled (checked) for a given port, the switch considers
moving the port into the Guest VLAN according to the rules outlined below.
This option is only available for EAPOL-based modes, i.e.:
- Port-based 802.1X
- Single 802.1X
- Multi 802.1X
For troubleshooting VLAN assignments, use the “Monitor→VLANs→VLAN Membership and VLAN Port” pages. These pages show
which modules have (temporarily) overridden the current Port VLAN configuration.
Guest VLAN Operation: When a Guest VLAN enabled port’s link comes up, the switch starts transmitting EAPOL Request Identity
frames. If the number of transmissions of such frames exceeds Max. Reauth. Count and no EAPOL frames have been received in
the meantime, the switch considers entering the Guest VLAN. The interval between transmission of EAPOL Request Identity frames
is configured with EAPOL Timeout. If Allow Guest VLAN if EAPOL Seen is enabled, the port will now be placed in the Guest VLAN.
If disabled, the switch will first check its history to see if an EAPOL frame has previously been received on the port (this history
is cleared if the port link goes down or the port’s Admin State is changed), and if not, the port will be placed in the Guest VLAN.
Otherwise, it will not move to the Guest VLAN, but continue transmitting EAPOL Request Identity frames at the rate given by EAPOL
Timeout.