Security: 802.1X Authentication
Properties
321
Cisco Sx350, SG350X, SG350XG, Sx550X & SG550XG Series Managed Switches, Firmware Release 2.2.5.x
17
Workflow 6: To configure unauthenticated VLANs
STEP 1
Click
Security
>
802.1X/MAC/Web Authentication
>
Properties
.
STEP 2
Select a VLAN, and click
Edit
.
STEP 3
Select a VLAN.
STEP 4
Optionally, uncheck
Authentication
to make the VLAN an unauthenticated VLAN.
STEP 5
Click
Apply
, and the Running Configuration file is updated.
Properties
The Properties page is used to globally enable port/device authentication. For authentication to
function, it must be activated both globally and individually on each port.
To define port-based authentication:
STEP 1
Click
Security
>
802.1X/MAC/Web Authentication
>
Properties
.
STEP 2
Enter the parameters.
•
Port-Based Authentication
—Enable or disable port-based authentication.
If this is disabled, 802.1X, MAC-based and web-based authentication are disabled.
•
Authentication Method
—Select the user authentication methods. The options are:
-
RADIUS, None
—Perform port authentication first by using the RADIUS server. If
no response is received from RADIUS (for example, if the server is down), then no
authentication is performed, and the session is permitted
.
If the server is available
but the user credentials are incorrect, access is denied and the session terminated.
-
RADIUS
—Authenticate the user on the RADIUS server. If no authentication is
performed, the session is not permitted.
-
None
—Do not authenticate the user. Permit the session.
•
Guest VLAN
—Select to enable the use of a guest VLAN for unauthorized ports. If a
guest VLAN is enabled, all unauthorized ports automatically join the VLAN selected in
the
Guest VLAN ID
field. If a port is later authorized, it is removed from the guest
VLAN.