Cisco 350XG series Administration Manual page 469

10g stackable managed switches
Table of Contents

Advertisement

Security: 802.1X Authentication
Overview
Unauthenticated Traffic
With Guest VLAN
Untagged
Full
Frames are
re-mapped to
multi-
the guest
sessions
VLAN
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
STEP 6
STEP 7
STEP 8
STEP 9
STEP 10
STEP 11
STEP 12
STEP 13
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
Without Guest VLAN
Tagged
Untagged
Frames
Frames are
are re-
dropped
mapped to
the guest
VLAN
unless
they
belongs to
the
unauthent
icated
VLANs
Common Tasks
Workflow 1: To enable 802. 1 x authentication on a port:
Click Security > 802.1X/MAC/Web Authentication > Properties.
Enable Port-based Authentication.
Select the Authentication Method .
Click Apply, and the Running Configuration file is updated.
Click Security > 802.1X/MAC/Web Authentication> Host and Session.
Select the required port and click Edit.
Set the Host Authentication mode.
Click Apply, and the Running Configuration file is updated.
Click Security > 802.1X/MAC/Web Authentication > Port Authentication.
Select a port, and click Edit.
Set the Administrative Port Control field to Auto.
Define the authentication methods.
Click Apply, and the Running Configuration file is updated.
Authenticated Traffic
With Radius VLAN
Tagged
Untagged
Frames
Frames are
are
re-mapped to
dropped
the RADIUS
unless
assigned
they
VLAN
belongs
to the
unauthent
icated
VLANs
Without Radius VLAN
Tagged
Untagged
Frames
Frames are
are re-
bridged based
mapped
on the static
to the
VLAN
Radius
configuration
VLAN
unless
they
belongs
to the
unauthent
icated
VLANs
20
Tagged
Frames
are
bridged
based on
the static
VLAN
configurat
ion
453

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

550xg series

Table of Contents