Configuring Security
Configuring 802.1X
Cisco 500 Series Stackable Managed Switch Administration Guide
322
18
Defining 802.1X Properties
The
802.1X Properties
page is used to globally enable 802.1X and define how
ports will be authenticated. For 802.1X to function, it must be activated both
globally and individually on each port.
To define port-based authentication:
STEP 1
Click
Security
>
802.1X
>
Properties
. The
Properties
page is displayed.
STEP 2
Enter the parameters.
•
Port-Based Authentication
—Enable or disable port-based, 802.1X
authentication.
•
Authentication Method
—Select the user authentication methods. The
options are:
-
RADIUS, None
—Perform port authentication first by using the RADIUS
server. If no response is received from RADIUS (for example, if the server
is down), then no authentication is performed, and the session is
permitted
.
If the server is available but the user credentials are incorrect,
access will be denied and the session terminated.
-
RADIUS
—Authenticate the user on the RADIUS server. If no
authentication is performed, the session is not permitted.
-
None
—Do not authenticate the user. Permit the session.
•
Guest VLAN
—Select to enable the use of a Guest VLAN for unauthorized
ports. If a Guest VLAN is enabled, all unauthorized ports automatically join
the VLAN selected in the
Guest VLAN ID
field. If a port is later authorized, it
is removed from the Guest VLAN.
•
Guest VLAN ID
—Select the guest VLAN from the list of VLANs.
•
Guest VLAN Timeout
—Define a time period:
-
After linkup, if the software does not detect the 802.1X supplicant, or the
authentication has failed, the port is added to the Guest VLAN, only after
the
Guest VLAN timeout
period has expired.
-
If the port state changes from
Authorized
to
Not Authorized
, the port is
added to the Guest VLAN only after the
Guest VLAN
timeout has expired.
The VLAN Authentication Table displays all VLANs, and indicates whether
authentication has been enabled on them.