C
HAPTER
4
| Configuring the Switch
Configuring 802.1X Port Authentication
– 84 –
expires, the switch will consider the client alive, and leave it
authenticated. Therefore, an age period of T will require the client to
send frames more frequent than T/2 to stay authenticated.
◆
Hold Time
- The time after an EAP Failure indication or RADIUS
timeout that a client is not allowed access. This setting applies to ports
running MAC-based authentication only. (Range: 10-1000000 seconds;
Default: 10 seconds)
If the RADIUS server denies a client access, or a RADIUS server
request times out (according to the timeout specified on the
Authentication menu,
page 65
), the client is put on hold in the
Unauthorized state. In this state, frames from the client will not cause
the switch to attempt to reauthenticate the client.
Port Configuration
◆
Port
– Port identifier. (Range: 1-28)
◆
Admin State
- Sets the authentication mode to one of the following
options:
■
Authorized
- Forces the port to grant access to all clients, either
dot1x-aware or otherwise. (This is the default setting.)
■
Unauthorized
- Forces the port to deny access to all clients, either
dot1x-aware or otherwise.
■
802.1X
- Requires a dot1x-aware client to be authorized by the
authentication server. Clients that are not dot1x-aware will be
denied access.
■
MAC-Based
- Enables MAC-based authentication on the port. The
switch does not transmit or accept EAPOL frames on the port.
Flooded frames and broadcast traffic will be transmitted on the port,
whether or not clients are authenticated on the port, whereas
unicast traffic from an unsuccessfully authenticated client will be
dropped. Clients that are not (or not yet) successfully authenticated
will not be allowed to transmit frames of any kind.
Port Admin state can only be set to Authorized for ports participating in
the Spanning Tree algorithm (see
page 78
).
When 802.1X authentication is enabled on a port, the MAC address
learning function for this interface is disabled, and the addresses
dynamically learned on this port are removed from the common
address table.
Authenticated MAC addresses are stored as dynamic entries in the
switch's secure MAC address table. Configured static MAC addresses
are added to the secure address table when seen on a switch port (see
page 98
). Static addresses are treated as authenticated without
sending a request to a RADIUS server.
When port status changes to down, all MAC addresses are cleared from
the secure MAC address table. Static VLAN assignments are not
restored.
Summary of Contents for 8028L2
Page 1: ...MANAGEMENT GUIDE TigerSwitchTM 10 100 1000 28 Port Gigabit Ethernet Switch SMC8028L2 ...
Page 6: ...ABOUT THIS GUIDE 6 ...
Page 22: ...FIGURES 22 ...
Page 26: ...SECTION Getting Started 26 ...
Page 46: ...CHAPTER 2 Initial Switch Configuration Managing System Files 46 ...
Page 48: ...SECTION Web Configuration 48 ...
Page 144: ...CHAPTER 4 Configuring the Switch Configuring DHCP Relay and Option 82 Information 144 ...
Page 184: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 184 ...
Page 238: ...CHAPTER 12 Port Commands 238 ...
Page 244: ...CHAPTER 13 Link Aggregation Commands 244 ...
Page 262: ...CHAPTER 15 RSTP Commands 262 ...
Page 272: ...CHAPTER 16 IEEE 802 1X Commands 272 ...
Page 282: ...CHAPTER 17 IGMP Commands 282 ...
Page 290: ...CHAPTER 18 LLDP Commands 290 ...
Page 296: ...CHAPTER 19 MAC Commands 296 ...
Page 306: ...CHAPTER 21 PVLAN Commands 306 ...
Page 318: ...CHAPTER 22 QoS Commands 318 ...
Page 352: ...CHAPTER 26 SNMP Commands 352 ...
Page 355: ...CHAPTER 27 HTTPS Commands 355 EXAMPLE HTTPS redirect enable HTTPS ...
Page 356: ...CHAPTER 27 HTTPS Commands 356 ...
Page 362: ...CHAPTER 29 UPnP Commands 362 ...
Page 370: ...CHAPTER 31 Firmware Commands 370 ...
Page 372: ...SECTION Appendices 372 ...
Page 386: ...GLOSSARY 386 ...
Page 391: ...INDEX 391 ...
Page 392: ...149100000079A R01 SMC8028L2 ...