261
password. Users in the Auth-Fail VLAN can access a limited set of network resources, such as a
software server, to download anti-virus software and system patches.
The Auth-Fail VLAN does not accommodate 802.1X users that have failed authentication for
authentication timeouts or network connection problems. The way that the network access device
handles VLANs on the port differs by 802.1X access control mode.
•
On a port that performs port-based access control:
Authentication status
VLAN manipulation
A user fails 802.1X
authentication.
The device assigns the Auth-Fail VLAN to the port as the PVID. All
802.1X users on this port can access only resources in the Auth-Fail
VLAN.
A user in the Auth-Fail VLAN
fails 802.1X
re-authentication.
The Auth-Fail VLAN is still the PVID on the port, and all 802.1X users
on this port are in this VLAN.
A user passes 802.1X
authentication.
•
The device assigns the VLAN specified for the user to the port as
the PVID, and removes the port from the Auth-Fail VLAN. After the
user logs off, the user-configured PVID restores.
•
If the authentication server assigns no VLAN, the initial PVID
applies. The user and all subsequent 802.1X users are assigned
to the user-configured PVID. After the user logs off, the PVID
remains unchanged.
•
On a port that performs MAC-based access control:
Authentication status
VLAN manipulation
A user fails 802.1X
authentication.
The device remaps the MAC address of the user to the Auth-Fail VLAN.
The user can access only resources in the Auth-Fail VLAN.
A user in the Auth-Fail VLAN
fails 802.1X
re-authentication.
The user is still in the Auth-Fail VLAN.
A user in the Auth-Fail VLAN
passes 802.1X
authentication.
The device remaps the MAC address of the user to the server-assigned
VLAN.
If the authentication server assigns no VLAN, remaps the MAC address
of the user to the initial PVID on the port.
To perform the 802.1X Auth-Fail VLAN function on a port that performs MAC-based access control,
you must ensure that the port is a hybrid port, and enable MAC-based VLAN on the port.
The network device assigns a hybrid port to an 802.1X Auth-Fail VLAN as an untagged member.
ACL assignment
You can specify an ACL for an 802.1X user to control its access to network resources. After the user
passes 802.1X authentication, the authentication server, either the local access device or a RADIUS
server, assigns the ACL to the port to filter the traffic from this user. In either case, you must configure
the ACL on the access device. You can change ACL rules while the user is online.
Configuration prerequisites
When you configure 802.1X, follow these restrictions and guidelines:
•
Configure an ISP domain and AAA scheme (local or RADIUS authentication) for 802.1X users.
For more information, see "
."
•
If RADIUS authentication is used, create user accounts on the RADIUS server.
Summary of Contents for FlexNetwork NJ5000
Page 12: ...x Index 440 ...
Page 39: ...27 Figure 16 Configuration complete ...
Page 67: ...55 Figure 47 Displaying the speed settings of ports ...
Page 78: ...66 Figure 59 Loopback test result ...
Page 158: ...146 Figure 156 Creating a static MAC address entry ...
Page 183: ...171 Figure 171 Configuring MSTP globally on Switch D ...
Page 243: ...231 Figure 237 IPv6 active route table ...