802.1X........................................................................................................................................................................................ 230
Guest VLANs..............................................................................................................................................................................................235
Limitations Using the Guest VLAN ......................................................................................................................................................235
Configure 802.1X Guest VLAN .................................................................................................................................................................235
Configure 802.1X Authenticator.................................................................................................................................................................237
802.1X User ................................................................................................................................................................................................240
Initialize Port(s) ..........................................................................................................................................................................................240
Reauthenticate Port(s) .................................................................................................................................................................................242
Authentic RADIUS Server..........................................................................................................................................................................243
Web-based Access Control (WAC) ........................................................................................................................................... 245
Conditions and Limitations .........................................................................................................................................................................245
WAC Global State ......................................................................................................................................................................................245
WAC Port Settings......................................................................................................................................................................................247
WAC User Account ....................................................................................................................................................................................249
WAC Host Table Settings...........................................................................................................................................................................250
Trust Host................................................................................................................................................................................... 251
Access Authentication Control................................................................................................................................................... 252
Authentication Policy & Parameter Settings ...............................................................................................................................................253
Application's Authentication Settings .........................................................................................................................................................253
Authentication Server Group ......................................................................................................................................................................254
Authentication Server Host .........................................................................................................................................................................255
Login Method Lists.....................................................................................................................................................................................257
Enable Method Lists ...................................................................................................................................................................................258
Configure Local Enable Password ..............................................................................................................................................................260
Enable Admin .............................................................................................................................................................................................261
RADIUS Accounting Settings ....................................................................................................................................................................262
MAC-based Access Control (MAC) .......................................................................................................................................... 264
Notes about MAC-based Access Control....................................................................................................................................................264
MAC-based Access Control Global Settings ..............................................................................................................................................264
MAC-based Access Control Local MAC Settings ......................................................................................................................................267
Safeguard Engine ....................................................................................................................................................................... 268
Safeguard Engine Settings ..........................................................................................................................................................................269
Traffic Segmentation.................................................................................................................................................................. 270
Secure Socket Layer (SSL) ........................................................................................................................................................ 271
SSL............................................................................................................................................................................................. 272
Secure Shell (SSH)..................................................................................................................................................................... 273
SSH Server Configuration...........................................................................................................................................................................274
SSH Authentication Mode and Algorithm Settings ....................................................................................................................................275
SSH User Authentication Mode..................................................................................................................................................................277
Compound Authentication ......................................................................................................................................................... 278
Compound Authentication Settings.............................................................................................................................................................278
Authentication Guest VLAN Settings.........................................................................................................................................................280
JWAC (Japanese Web-based Access Control)........................................................................................................................... 281
JWAC Global Configuration.......................................................................................................................................................................281
JWAC Port Settings ....................................................................................................................................................................................284