Configuring Authentication And Authorization By Mac Address - D-Link DWS-1008 User Manual

Wireless 8 port switch with poe
Hide thumbs Also See for DWS-1008:
Table of Contents

Advertisement

DWS-1008 User's Manual
The following command sets the Bonded Auth period to 60 seconds, to allow time for WEP
users to reauthenticate:
DWS-1008# set dot1x bonded-period 60
success: change accepted.
Displaying Bonded Auth Configuration Information
T
o display Bonded Auth configuration information, use the following command:
show dot1x config
In the following example, bob.mycorp.com uses Bonded Auth, and the Bonded Auth period
is set to 60 seconds.
DWS-1008# show dot1x config
802.1X user policy
----------------------
'host/bob-laptop.mycorp.com' on ssid 'mycorp' doing PASSTHRU
'bob.mycorp.com' on ssid 'mycorp' doing PASSTHRU (bonded)
802.1X parameter
----------------
supplicant timeout
auth-server timeout
quiet period
transmit period
reauthentication period
maximum requests
key transmission
reauthentication
authentication control
WEP rekey period
WEP rekey
Bonded period
Information for the 802.1X authentication rule for the machine (host/bob-laptop.mycorp.com)
is also displayed. However, the bonded option is configured only for the user's authentication
rule. The bonded option applies only to the authentication rules for users, not the authentication
rules for machines.
Configuring Authentication and Authorization by MAC Address
You must sometimes authenticate users based on the MAC addresses of their devices rather
than a username-password or certificate. For example, some Voice-over-IP (VoIP) phones
and personal digital assistants (PDAs) do not support 802.1X authentication. If a client does
not support 802.1X, MSS attempts to perform MAC authentication for the client instead. The
switch can discover the MAC address of the device from received frames and can use the
MAC address in place of a username for the client.
D-Link Systems, Inc.
setting
-------
30
30
60
5
3600
2
enabled
enabled
enabled
1800
enabled
60
Configuring AAA for Network Users
285

Advertisement

Table of Contents
loading

Table of Contents