Use The Authentication Manager To Set Up An Authentication Method List - NETGEAR M4200 Software Administration Manual

M4200 and m4300 series prosafe managed switches
Hide thumbs Also See for M4200:
Table of Contents

Advertisement

Use the Authentication Manager to Set Up an
Authentication Method List
The authentication manager lets you configure an authentication method list, which you can
apply on a per-port basis. If authentication is disabled, no authentication method is applied
and the port provides open access. By default, authentication is disabled for all ports.
The authentication manager lets you configure the following authentication methods in an
authentication method list:
dot1x
MAB
captive portal (that is, web authentication)
The default authentication method list applies these authentication methods in the order
dot1x, MAB, and captive portal as the default methods for all ports.
You cannot configure another authentication method after the captive portal method, that is,
the captive portal method must be the last method in an authentication method list.
When a client connects to a port, the switch attempts to authenticate the client through the
port-based authentication method list. If an authentication method times out (or an error
occurs), the switch attempts to authenticate with the next authentication method in the list. If
all authentication methods time out, the switch starts a timer for which the value is equal to
the authentication restart timer. At the expiration of the timer, the authentication manager
restarts the authentication process for the first method in the list. If the client connection goes
down and comes up again, the authentication manager restarts the authentication sequence.
Note:
The authentication manager controls only the order in which the switch
executes the authentication methods. The authentication manager does
not configure or change the authentication methods. You need to ensure
that the switch is configured correctly so that the switch can execute the
authentication methods as presented in the authentication method list.
The priority of an authentication method is determined by its position in authentication
method list. If you do not configure authentication method priorities, the relative priorities (that
is, the highest first) are in the same order as that of the port-based authentication list.
Authentication priority allows a higher-priority method to interrupt an authentication process
that is in progress with a lower-priority method. Alternatively, if a client is already
authenticated, an interrupt from a higher priority method can cause a client that is already
authenticated through a lower-priority method to be reauthenticated through the
higher-priority method.
Managed Switches
Security Management
366

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

M4300

Table of Contents