i3 International Cortex S243 User Manual page 54

Poe managed switch for video surveillance networks
Table of Contents

Advertisement

must follow this rule: All 8 octets in the attribute's value must be identical and consist of ASCII
characters in the range 0 – 3, which translates into the desired QoS Class in the rang [0; 3].
Radius-Assigned
When RADIUS-Assigned VLAN is both globally enabled and enabled (checked) for a given port,
VLAN Enabled
the switch reacts to VLAN ID information carried in the RADIUS Access-Accept packet transmitted
by the RADIUS server when a supplicant is successfully authenticated. If present and
valid, the port's Port VLAN ID will be changed to this VLAN ID, the port will be set to be a
member of that VLAN ID, and the port will be forced into VLAN unaware mode. Once assigned,
all traffic arriving on the port will be classified and switched on the RADIUS-assigned VLAN ID.
If (re-)authentication fails or the RADIUS Access-Accept packet no longer carries a VLAN ID or
it's invalid, or the supplicant is otherwise no longer present on the port, the port's VLAN ID
is immediately reverted to the original VLAN ID (which may be changed by the administrator
in the meanwhile without affecting the RADIUS-assigned).
This option is only available for single-client modes, for example: Port-based 802.1X and Single
802.1X.
For trouble-shooting VLAN assignments, use the "Monitor→VLANs→VLAN Membership and
VLAN Port" pages. These pages show which modules have (temporarily) overridden the
current Port VLAN configuration.
RADIUS attributes used in identifying a VLAN ID:
RFC2868 and RFC3580 form the basis for the attributes used in identifying a VLAN ID in an
Access-Accept packet. The following criteria are used:
Guest VLAN
When Guest VLAN is both globally enabled and enabled (checked) for a given port, the
Enabled
switch considers moving the port into the Guest VLAN according to the rules outlined below.
This option is only available for EAPOL-based modes, for instance Port-based 802.1X, Single
802.1X, Multi 802.1X.
For trouble-shooting VLAN assignments, use the "Monitor→VLANs→VLAN Membership and
VLAN Port" pages. These pages show which modules have (temporarily) overridden the
current Port VLAN configuration.
Guest VLAN Operation: When a Guest VLAN enabled port's link comes up, the switch starts
transmitting EAPOL Request Identity frames. If the number of transmissions of such frames
exceeds Max. Reauth. Count and no EAPOL frames have been received in the meanwhile,
the switch considers entering the Guest VLAN. The interval between transmissions of EAPOL
Request Identity frames is configured with EAPOL Timeout. If Allow Guest VLAN if EAPOL Seen is
enabled, the port will now be placed in the Guest VLAN. If disabled, the switch will first
check its history to see if an EAPOL frame has previously been received on the port (this
history is cleared if the port link goes down or the port's Admin State is changed), and if not, the
port will be placed in the Guest VLAN. Otherwise it will not move to the Guest VLAN, but continue
transmitting EAPOL Request Identity frames at the rate given by EAPOL Timeout. Once in the
Guest VLAN, the port is considered authenticated, and all attached clients on the port are
allowed access on this VLAN. The switch will not transmit an EAPOL Success frame when
entering the Guest VLAN.
While in the Guest VLAN, the switch monitors the link for EAPOL frames, and if one such frame
is received, the switch immediately takes the port out of the Guest VLAN and starts
authenticating the supplicant according to the port mode. If an EAPOL frame is received, the
port will never be able to go back into the Guest VLAN if the "Allow Guest VLAN if EAPOL
Seen" is disabled.
-
The Tunnel-Medium Type, Tunnel-Type, and Tunnel-Private-Group-ID attributes must all
be present at least once in the Access-Accept Packet.
-
The Switch look for the first set of these attributes that have the same Tag value and
fulfill the following requirments (if Tag ++0 is used, the Tunnel-Pribate-Group-ID does
not need to include a Tag):
-
Value of Tunnel-Medium-Type must be set to "IEEE-802" (ordinal 6).
-
Value of Tunnel-Type must be set to "VLAN" (ordinal 13).
-
Value of Tunnel-Private-Group-ID must be a string of ASCII chars in the range '0' - '9',
which is interpreted as a decimal string representing the VLAN ID. Leading '0's are
discarded. The final value must be in the range [1; 4095].
53

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents