Configuring 802.1X Network Access Control; Figure 435: Switch With 802.1X Network Access Control - D-Link DWL-8600AP User Manual

Dws-4000 series access points
Hide thumbs Also See for DWL-8600AP:
Table of Contents

Advertisement

D-Link UWS User Manual

Configuring 802.1X Network Access Control

This example configures a single RADIUS server used for authentication and accounting at 10.10.10.10. The
shared secret is configured to be secret. The process creates a new authentication list, called radiusList, which
uses RADIUS as the authentication method. This authentication list is associated with the 802.1X default login.
IEEE 802.1X port-based access control is enabled for the system, and interface 0/1 is configured to be in force-
authorized mode because this is where the RADIUS server and protected network resources are located.
If a user, or supplicant, attempts to communicate via the switch on any interface except interface 0/1, the
system challenges the supplicant for login credentials. The system encrypts the provided information and
transmits it to the RADIUS server. If the RADIUS server grants access, the system sets the 802.1X port state of
the interface to authorized, and the supplicant is able to access network resources.
1. To configure the RADIUS Server information in the switch, go to the LAN > Security > RADIUS > RADIUS
Authentication Server Configuration page.
2. Select Add from RADIUS Server Host Address field.
3. Enter 10.10.10.10 in the Host Address field.
4. Click Submit.
The page refreshes, and additional fields appear.
5. in the Secret field, enter secret and select the Apply option.
6. From the Primary Server field, select Yes.
D-Link
Oct. 2015

Figure 435: Switch with 802.1X Network Access Control

Configuring 802.1X Network Access Control
Unified Wired and Wireless Access System
Page 688

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents