Switch - Dell PowerConnect J-EX4200-24T Software Manual

J series; j-ex series
Table of Contents

Advertisement

Meaning
Related
Documentation
Example: Configuring Static MAC Bypass of Authentication on a J-EX Series Switch
Requirements
Session Reauth interval: 60 seconds
Reauthentication due in 50 seconds
The output from the
show vlans
VLAN and the VLAN ID as
The output from the
show dot1x interface ge-0/0/1.0 detail
field, indicating that a supplicant at this interface failed 802.1X
VLAN membership
authentication and was passed through to the
Example: Connecting a RADIUS Server for 802.1X to a J-EX Series Switch on page 2267
Example: Setting Up 802.1X for Single Supplicant or Multiple Supplicant Configurations
on a J-EX Series Switch on page 2290
Example: Setting Up VoIP with 802.1X and LLDP-MED on a J-EX Series Switch on
page 2302
Configuring 802.1X Interface Settings (CLI Procedure) on page 2331
To allow devices to access your LAN through 802.1X-configured interfaces without
authentication, you can configure a static MAC bypass list on the J-EX Series switch. The
static MAC bypass list, also known as the exclusion list, specifies MAC addresses that
are allowed on the switch without a request to an authentication server.
You can use static MAC bypass of authentication to allow connection for devices that
are not 802.1X-enabled, such as printers. If a host's MAC address is compared and
matched against the static MAC address list, the nonresponsive host is authenticated
and an interface opened for it.
This example describes how to configure static MAC bypass of authentication for two
printers:
Requirements on page 2281
Overview and Topology on page 2282
Configuration on page 2284
Verification on page 2285
This example uses the following hardware and software components:
One J-EX Series switch acting as an authenticator port access entity (PAE). The ports
on the authenticator PAE form a control gate that blocks all traffic to and from
supplicants until they are authenticated.
Before you configure static MAC authentication, be sure you have:
Chapter 82: Examples: Access Control Configuration
command shows
guest-vlan
.
300
guest-vlan
as the the name of the
command displays the
Guest
.
2281

Advertisement

Table of Contents
loading

Table of Contents