Cisco Systems SRW224G4PK9NA Switch User Manual


 
Security
Configuring 802.1X
333 Cisco Small Business 300 Series Managed Switch Administration Guide
17
Port-Based Authentication—Enable or disable port-based, 802.1X
authentication.
Authentication Method—Select the user authentication methods. The
options are:
- RADIUS, None—Perform port authentication first by using the RADIUS
server. If no response is received from RADIUS (for example, if the server
is down), then no authentication is performed, and the session is
permitted
. If the server is available but the user credentials are incorrect,
access is denied and the session terminated.
- RADIUS—Authenticate the user on the RADIUS server. If no
authentication is performed, the session is not permitted.
- None—Do not authenticate the user. Permit the session.
Guest VLAN—Select to enable the use of a Guest VLAN for unauthorized
ports. If a Guest VLAN is enabled, all unauthorized ports automatically join
the VLAN selected in the Guest VLAN ID field. If a port is later authorized, it
is removed from the Guest VLAN.
Guest VLAN ID—Select the guest VLAN from the list of VLANs.
Guest VLAN Timeout—Define a time period:
- After linkup, if the software does not detect the 802.1X supplicant, or the
authentication has failed, the port is added to the Guest VLAN, only after
the Guest VLAN timeout period has expired.
- If the port state changes from Authorized to Not Authorized, the port is
added to the Guest VLAN only after the Guest VLAN timeout has expired.
The VLAN Authentication Table displays all VLANs, and indicates whether
authentication has been enabled on them.
STEP 3 Click Apply. The 802.1X properties are written to the Running Configuration file.