![Ruckus Wireless ZoneDirector 1200 User Manual Download Page 207](http://html1.mh-extra.com/html/ruckus-wireless/zonedirector-1200/zonedirector-1200_user-manual_1498797207.webp)
• Dynamic VLAN: (Default disabled). Dynamically assign VLANs based on the
policies set on the RADIUS server.
• Authenticator: Select the RADIUS server from the list. A RADIUS server must
be selected to set this port as a MAC-based authenticator.
5.
Enable MAC authentication bypass: Enable this option to allow AAA server queries
using the MAC address as both the user name and password. If MAC authentication
is unsuccessful, the normal 802.1X authentication exchange is attempted.
Figure 140: Enabling Guest VLAN and Dynamic VLAN on a MAC-based 802.1X Authenticator
port
AP Ethernet Port as Supplicant
You can also configure a port to act as a supplicant and force it to authenticate itself to
an upstream authenticator port. Until the AP has successfully done so, the state of the
authenticator port is closed and packets from the AP or stations behind it will be dropped
at the authenticator port.
In this configuration, it is expected that the connected authenticator port is configured
with the following characteristics:
• As a Trunk Port to pass all VLAN packets, and
• In port-based authentication mode
Each AP is allowed to configure a maximum of one Ethernet port as an 802.1X supplicant,
and the supplicant port must be a Trunk Port.
207
Ruckus Wireless ZoneDirector™ Release 10.0 User Guide
Managing Access Points
Configuring AP Ethernet Ports