Cisco Systems SG50028PK9NA Switch User Manual


 
Security: 802.1X Authentication
802.1X Configuration Through the GUI
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 397
19
- If the port state changes from Authorized to Not Authorized, the port is
added to the guest VLAN only after the Guest VLAN timeout has expired.
Tra ps—To enable traps, select one of more of the following options:
- 802.1x Authentication Failure Traps—Select to generate a trap if 802.1x
authentication fails.
- 802.1x Authentication Success Traps—Select to generate a trap if
802.1x authentication succeeds.
- MAC Authentication Failure Traps—Select to generate a trap if MAC
authentication fails.
- MAC Authentication Success Traps—Select to generate a trap if MAC
authentication succeeds.
When the switch is in Layer 2 switch mode:
- Web Authentication Failure Traps—Select to generate a trap if Web
authentication fails.
- Web Authentication Success Traps—Select to generate a trap if Web
authentication succeeds.
- Web Authentication Quiet Traps—Select to generate a trap if a quiet
period commences.
When the device is in Layer 3 router mode, the VLAN Authentication Table
displays all VLANs, and indicates whether authentication has been enabled on
them.
STEP 3 Click Apply. The 802.1X properties are written to the Running Configuration file.
Defining 802.1X Port Authentication
The Port Authentication page enables configuration of 802.1X parameters for each
port. Since some of the configuration changes are only possible while the port is
in Force Authorized state, such as host authentication, it is recommended that you
change the port control to Force Authorized before making changes. When the
configuration is complete, return the port control to its previous state.
NOTE A port with 802.1x defined on it cannot become a member of a LAG.
To define 802.1X authentication: