Note:
1.
The 802.1X function takes effect only when it is enabled globally on the switch and for the
port.
2.
The 802.1X function cannot be enabled for LAG member ports. That is, the port with
802.1X function enabled cannot be added to the LAG.
3.
The 802.1X function should not be enabled for the port connected to the authentication
server. In addition, the authentication parameters of the switch and the authentication
server should be the same.
Configuration Procedure:
Step Operation
Description
1
Connect an authentication
server to the switch and do
some configuration.
Required. Record the information of the client in the LAN
to the authentication server and configure the
corresponding authentication username and password
for the client.
2
Install the 802.1X client
software.
Required. For the client computers, you are required to
install the 802.1X software TpSupplicant provided on the
CD. The installation guide is also provided on the CD.
3
Configure the 802.1X
globally.
Required. By default, the global 802.1X function is
disabled. On the
Network Security
→
802.1X
→
Global
Config
page, configure the 802.1X function globally.
4
Configure the 802.1X for
the port.
Required. On the
Network Security
→
802.1X
→
Port
Config
page, configure the 802.1X feature for the port of
the switch basing on the actual network.
5
Configure the parameters
of the authentication server
Required. On the
Network Security
→
AAA
→
Radius
Config
page, configure the parameters of the server.
14.7
AAA
Overview
AAA stands for authentication, authorization and accounting. This feature is used to
authenticate users trying to log in to the switch or trying to access the administrative level
privilege.
Username and password pairs are used for login and privilege authentication. The
authentication can be processed locally in the switch or centrally in the RADIUS/
server(s). The local authentication username and password pairs can be configured in
Applicable Access Application
The authentication can be applied on the following access applications: Console, Telnet, SSH
and HTTP.
359