272
C
HAPTER
22: MAC A
UTHENTICATION
C
ONFIGURATION
Configuring a Guest
VLAN
n
Different from Guest VLANs described in the 802.1x and System-Guard chapters,
Guest VLANs mentioned in this section refer to Guest VLANs dedicated to MAC
address authentication.
After completing configuration tasks in “Configuring Basic MAC Authentication
Functions” on page 270 for a switch, this switch can authenticate access users
according to their MAC addresses or according to fixed user names and
passwords. The switch will not learn MAC addresses of the clients failing in the
authentication into its local MAC address table, thus prevent illegal users from
accessing the network.
In some cases, if the clients failing in the authentication are required to access
some restricted resources in the network (such as the virus library update server),
you can use the Guest VLAN.
You can configure a Guest VLAN for each port of the switch. When a client
connected to a port fails in MAC address authentication, this port will be added
into the Guest VLAN automatically. The MAC address of this client will also be
learned into the MAC address table of the Guest VLAN, and thus the user can
access the network resources of the Guest VLAN.
After a port is added to a Guest VLAN, the switch will re-authenticate the first
access user of this port (namely, the first user whose unicast MAC address is
learned by the switch) periodically. If this user passes the re-authentication, this
port will exit the Guest VLAN, and thus the user can access the network normally.
c
CAUTION:
■
Guest VLANs are implemented in the mode of adding a port to a VLAN. For
example, when multiple users are connected to a port, if the first user fails in
the authentication, the other users can access only the contents of the Guest
VLAN. The switch will re-authenticate only the first user accessing this port,
and the other users cannot be authenticated again. Thus, if more than one
client is connected to a port, you cannot configure a Guest VLAN for this port.
■
After users that are connected to an existing port failed to pass authentication,
the switch adds the port to the Guest VLAN. Therefore, the Guest VLAN can
separate unauthenticated users on an access port. When it comes to a trunk
port or a hybrid port, if a packet itself has a VLAN tag and be in the VLAN that
the port allows to pass, the packet will be forwarded perfectly without the
influence of the Guest VLAN. That is, packets can be forwarded to the VLANs
other than the Guest VLAN through the trunk port and the hybrid port, even
users fail to pass authentication.
Table 206
Configure a Guest VLAN
Operation
Command
Description
Enter system view
system-view
-
Enter Ethernet port view
interface
interface-type
interface-number
-
Содержание Switch 4210 9-Port
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564 ...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Страница 340: ...338 CHAPTER 30 CLUSTER ...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...