Authenticator Overview - Cisco 500 Series Administration Manual

Stackable managed
Hide thumbs Also See for 500 Series:
Table of Contents

Advertisement

Security: 802.1X Authentication

Authenticator Overview

Authenticator Overview
Cisco 500 Series Stackable Managed Switch Administration Guide
All of this is accomplished with no impact on end users or on network-attached
hosts. Open Access can be activated in the
Port Administrative Authentication States
The port administrative state determines whether the client is granted access to
the network.
The port administrative state can be configured in the Security > 802.1X/MAC/
Web Authentication > Port Authentication page.
The following values are available:
force-authorized
Port authentication is disabled and the port transmits all traffic in
accordance with its static configuration without requiring any
authentication. The switch sends the 802.1x EAP-packet with the EAP
success message inside when it receives the 802.1x EAPOL-start message.
This is the default state.
force-unauthorized
Port authentication is disabled and the port transmits all traffic via the guest
VLAN and unauthenticated VLANs. For more information see
and Session
Authentication. The switch sends 802.1x EAP packets with
EAP failure messages inside when it receives 802.1x EAPOL-Start
messages.
auto
Enables 802.1 x authentications in accordance with the configured port
host mode and authentication methods configured on the port.
Port Host Modes
Ports can be placed in the following port host modes (configured in the Security >
802.1X/MAC/Web Authentication > Host and Authentication page):
Single-Host Mode
802.1X Port Authentication
22
page.
Defining Host
484

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents