Table 39: Radius Server Settings; Table 40: 802.1X Exclusion List - Juniper EX Series User Manual

J-web application package
Hide thumbs Also See for EX Series:
Table of Contents

Advertisement

J-Web Application Package User Guide for EX Series Switches, Release 14.1X53-A1

Table 39: RADIUS Server Settings

Field
IP Address
Password
Confirm Password
Server Port Number
Source Address
Retry Attempts
Timeout

Table 40: 802.1X Exclusion List

Field
MAC Address
Exclude if connected
through the port
74
RADIUS Servers—Specifies the RADIUS server to be used for authentication. Select
the corresponding check box to specify a server. Click
the RADIUS server settings. Enter information as specified in
Exclusion List—Excludes hosts from the 802.1X authentication list by specifying the
MAC address. Click
Add
MAC addresses. Enter information as specified in
Edit—Specifies 802.1X settings for the selected interface
Apply 802.1X Profile—Applies an 802.1X profile based on the port role. If a message
appears asking whether you want to configure a RADIUS server, click
802.1X Configuration—Configures custom 802.1X settings for the selected
interface. If a message appears asking whether you want to configure a RADIUS
server, click
. Enter information as specified in
Yes
configure 802.1X port settings, enter information as specified in
Table 41 on page
75.
Delete—Deletes 802.1X authentication configuration on the selected interface.
Function
Specifies the IP address of the server.
Specifies the login password.
Verifies the login password for the server.
Specifies the port with which the server is associated.
Specifies the source address of the switch using which
the switch can communicate with the server.
Specifies the number of login retries allowed after a
login failure.
Specifies the time interval to wait before the connection
to the server is closed.
Function
Specifies the MAC address to be excluded from
802.1X authentication.
Specifies that the host can bypass authentication
if it is connected through a particular interface.
or
Edit
in the Exclusion List screen to include or modify the
Table 40 on page
Your Action
Enter the IP address in dotted decimal
notation.
Enter the password.
Reenter the password.
Type the port number.
Type the IP address in dotted decimal
notation.
Type the number.
Type the interval in seconds.
Your Action
Enter the MAC address.
Select to enable the option. Select the port
through which the host is connected.
Copyright © 2017, Juniper Networks, Inc.
or
to add or modify
Add
Edit
Table 39 on page
74.
Yes
.
Table 39 on page
74. To
74.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents