
Configuring Multiple Authentication Methods
18-30
Security Configuration
Parameters
None.
Defaults
None.
Mode
Switch
command,
read
‐
write.
Example
This
example
resets
the
MAC
authentication
significant
bits
to
48.
C2(su)->clear macauthentication significant-bits
Configuring Multiple Authentication Methods
About Multiple Authentication Types
When
enabled,
multiple
authentication
types
allow
users
to
authenticate
using
up
to
two
methods
on
the
same
port.
In
order
for
multiple
authentication
to
function
on
the
device,
each
possible
method
of
authentication
(MAC
authentication,
802.1X,
PWA)
must
be
enabled
globally
and
configured
appropriately
on
the
desired
ports
with
its
corresponding
command
set
described
in
this
chapter.
Multiple
authentication
mode
must
be
globally
enabled
on
the
device
using
the
command.
Configuring Multi-User Authentication (User + IP phone)
The
User
+
IP
phone
multi
‐
user
authentication
feature
allows
a
user
and
their
IP
phone
to
both
use
a
single
port
on
the
C2
but
to
have
separate
policy
roles.
ʺ
User
+
IP
Phone
ʺ
Authentication
on
the
SecureStack
C2
is
implemented
by
assigning
an
ingressed
packet
received
on
a
port
to
a
policy
role
based
on
the
VLAN
the
packet
was
assigned
to,
and
not
the
packet
ʹ
s
source
MAC
address.
Therefore,
on
a
port
configured
for
User
+
IP
Phone
Authentication,
there
exists
two
different
VLAN
‐
to
‐
policy
role
mappings.
The
policy
role
for
the
IP
phone
is
statically
mapped
using
the
VLAN
‐
to
‐
policy
mapping
feature
which
assigns
any
packets
received
with
a
VLAN
tag
set
to
a
specific
VID
(for
example,
Voice
VLAN)
to
an
indicated
policy
role
(for
example,
IP
Phone
policy
role).
Therefore,
it
is
required
that
IP
phone
is
configured
to
send
VLAN
tagged
packets
to
the
“Voice”
VLAN.
The
second
policy
role,
for
the
user,
can
either
be
statically
configured
with
the
default
policy
role
on
the
port
or
dynamically
assigned
through
authentication
to
the
network.
When
the
default
policy
role
is
assigned
on
a
port,
the
VLAN
set
as
the
port
ʹ
s
PVID
is
mapped
to
the
default
policy
Note:
C2 devices support up to eight authenticated users per port.
Note:
The only Multi-User Authentication supported on the C2 is User + IP phone. The IP phone
has to authenticate using 802.1x or MAC authentication, but the User may authenticate using
802.1x, PWA, or MAC authentication.
Содержание SecureStack C2
Страница 1: ...SecureStack C2 Stackable Switches Configuration Guide Firmware Version 5 1 xx P N 9033991 16 ...
Страница 2: ......
Страница 28: ...xxvi ...
Страница 106: ...set ssl 3 52 Basic Configuration ...
Страница 226: ...Creating a Basic SNMP Trap Configuration 6 38 SNMP Configuration ...
Страница 278: ...show spantree nonforwardingreason 7 52 Spanning Tree Configuration ...
Страница 302: ...set garp timer 8 24 802 1Q VLAN Configuration ...
Страница 448: ...show dhcp pool configuration 14 30 DHCP Server Configuration ...
Страница 454: ...no license advanced 15 6 Preparing for Router Mode ...