Configuring Security
Configuring 802.1X
Cisco 500 Series Stackable Managed Switch Administration Guide
324
18
STEP 2
Select a port, and click
Edit.
The
Edit Port Authentication
page is displayed.
STEP 3
Enter the parameters.
•
Interface
—Select a port.
•
User Name
—Displays the username of the port.
•
Current Port Control
—Displays the current port authorization state. If the
state is
Authorized
, the port is either authenticated or the
Administrative
Port Control
is
Force Authorized
. Conversely, if the state is
Unauthorized
,
then the port is either not authenticated or the
Administrative Port Control
is
Force Unauthorized
.
•
Administrative Port Control
—Select the Administrative Port Authorization
state. The options are:
-
Force Unauthorized
—Denies the interface access by moving the
interface into the unauthorized state. The switch does not provide
authentication services to the client through the interface.
-
Auto
—Enables port-based authentication and authorization on the
switch. The interface moves between an authorized or unauthorized
state based on the authentication exchange between the switch and the
client.
-
Force Authorized
—Authorizes the interface without authentication.
•
RADIUS VLAN Assignment
—Select to enable Dynamic VLAN assignment
on the selected port. Dynamic VLAN assignment is possible only when the
802.1X mode is set to multiple session. (After authentication, the port joins
the supplicant VLAN as an untagged port in that VLAN.)
TIP
For the Dynamic VLAN Assignment feature to work, the switch requires the
following VLAN attributes to be sent by the RADIUS server (as defined in
RFC 3580):
-
[64] Tunnel-Type = VLAN (type 13)
-
[65] Tunnel-Medium-Type = 802 (type 6)
-
[81] Tunnel-Private-Group-Id = VLAN ID
•
Guest VLAN
—Select to indicate that the usage of a previously-defined
Guest VLAN is enabled for the switch. The options are: