Security: 802.1X Authentication
Properties
364
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
18
The fields in this page are described in
Port Authentication
.
STEP 5
Click
Apply
, and the Running Configuration file is updated.
Properties
The Properties page is used to globally enable port/device authentication. For authentication to
function, it must be activated both globally and individually on each port.
To define port-based authentication:
STEP 1
Click
Security > 802.1X Authentication >
Properties
.
STEP 2
Enter the parameters.
•
Port-Based Authentication
—Enable or disable port-based authentication.
If this is disabled, 802.1X, MAC-based and web-based authentication and 802.1x
supplicant are disabled.
•
Authentication Method
—Select the user authentication methods. The options are:
-
RADIUS, None
—Perform port authentication first by using the RADIUS server. If
no response is received from RADIUS (for example, if the server is down), then no
authentication is performed, and the session is permitted
.
If the server is available
but the user credentials are incorrect, access is denied and the session terminated.
-
RADIUS
—Authenticate the user on the RADIUS server. If no authentication is
performed, the session is not permitted.
-
None
—Do not authenticate the user. Permit the session.
•
Guest VLAN
—Select to enable the use of a guest VLAN for unauthorized ports. If a
guest VLAN is enabled, all unauthorized ports automatically join the VLAN selected in
the
Guest VLAN ID
field. If a port is later authorized, it is removed from the guest
VLAN.
The guest VLAN can be defined as a layer 3 interface (assigned an IP address) like any
other VLAN. However, device management is not available via the guest VLAN IP
address.
•
Guest VLAN ID
—Select the guest VLAN from the list of VLANs.