Configuring Device Security
Configuring Network Security
Page 85
• Authentication Method — Specifies the authentication method used. The possible field values are:
– None — No authentication method is used to authenticate the port.
– RADIUS — Port authentication is performed via RADIUS server.
– RADIUS, None — Port authentication is performed first via the RADIUS server. If the port is not
authenticated, then no authentication method is used, and the session is permitted.
• Guest VLAN — Specifies whether the Guest VLAN is enabled on the device. The possible field values are:
– Enable — Enables using a Guest VLAN for unauthorized ports. If a Guest VLAN is enabled, the
unauthorized port automatically joins the VLAN selected in the VLAN List field.
– Disable — Disables port-based authentication on the device. This is the default.
• VLAN List — Contains a list of VLANs. The Guest VLAN is selected from the VLAN list.
2. Define the Port-based Authentication State, Authentication Method, Guest VLAN, and VLAN List fields.
3. Click . The network authentication properties are set, and the device is updated.