Chapter 1: Configuration
Configuring 802.1X authentication
Page
1-145
802.1x authentication page of SM
The 802.1X Authentication page of SM is explained in
Table 45 802.1X authentication attributes –450 Platform Family SM
Attribute
Meaning
802.1x Bridging Mode
This parameter specifies the bridging mode used by SM. It is disabled by
default.
Following are the available options for this parameter.
•
Disable 802.1x: Disable 802.1x authentication.
•
Require 802.1x for all traffic: 802.1x authentication should be successful
for any traffic to pass through the SM (i.e. Authenticator).
•
Require 802.1x for all non-management traffic: Management traffic will
be allowed to pass through the SM without 802.1x Authentication.
802.1x Authentication
Mode
This parameter specifies the authentication mode used by SM.
•
Port Based Authentication: SM port is activated once the 802.1x
authentication is successful. This configuration needs to be used when
single host is connected behind SM. If authentication is successful, SM
port is enabled, and all traffic will pass through.
•
MAC Address Based Authentication: This option needs to be used
when multiple hosts are connected behind an SM. Each host needs to be
authenticated by 802.1x protocol to access the network. The traffic is
filtered based on the source MAC address of the host, only the traffic
from authenticated host will be allowed to access the network.
802.1x VLAN (Range :
1 — 4094)
This parameter specifies the number of VLAN configurations. It ranges from
1 to 4094.
VLAN configuration is used for sending 802.1x packet on the configured
VLAN. If a customer excepts EAPoL packets on a VLAN, customer needs to
configure the VLAN. Once VLAN is configured, all EAPoL packets are
exchanged on the configured VLAN. VLAN 1 is the default configuration
which is equivalent to untagged traffic.
Summary of Contents for PMP 450 AP
Page 51: ...Chapter 1 Configuration Quick link setup Page 1 23 ...
Page 155: ...Chapter 1 Configuration Configuring security Page 1 127 ...
Page 163: ...Chapter 1 Configuration Configuring security Page 1 135 ...
Page 164: ...Chapter 1 Configuration Configuring security Page 1 136 ...
Page 193: ...Chapter 1 Configuration Configuring radio parameters Page 1 165 ...
Page 194: ...Chapter 1 Configuration Configuring radio parameters Page 1 166 ...
Page 195: ...Chapter 1 Configuration Configuring radio parameters Page 1 167 ...
Page 206: ...Chapter 1 Configuration Configuring radio parameters Page 1 178 ...
Page 210: ...Chapter 1 Configuration Configuring radio parameters Page 1 182 ...
Page 636: ...Chapter 5 Troubleshooting Logs Page 5 16 Figure 95 SM Authorization log ...