Cisco 300 Series Administration Manual page 427

Managed switch
Hide thumbs Also See for 300 Series:
Table of Contents

Advertisement

19
NOTE
390
SKU
SG500X
SG500XG
When web-based authentication is not supported, guest VLAN and DVA
cannot be configured in multi-session mode.
When web-based authentication is supported, guest VLAN and DVA can be
configured in multi-session mode
Unauthenticated VLANs and the Guest VLAN
Unauthenticated VLANs and the guest VLAN provide access to services that do
not require the subscribing devices or ports to be 802. 1 X or MAC-Based
authenticated and authorized.
The guest VLAN is the VLAN that is assigned to an unauthorized client. You can
configure the guest VLAN and one or more VLANs to be unauthenticated in the
Security > 802. 1 X/MAC/Web Authentication > Properties page.
An unauthenticated VLAN is a VLAN that allows access by both authorized and
unauthorized devices or ports.
An unauthenticated VLAN has the following characteristics:
It must be a static VLAN, and cannot be the guest VLAN or the default VLAN.
The member ports must be manually configured as tagged members.
The member ports must be trunk and/or general ports. An access port
cannot be member of an unauthenticated VLAN.
The guest VLAN, if configured, is a static VLAN with the following characteristics:
It must be manually defined from an existing static VLAN.
The guest VLAN cannot be used as the Voice VLAN or an unauthenticated
VLAN.
See
"Table 3 Guest VLAN Support and RADIUS-VLAN Assignment Support"
see a summary of the modes in which guest VLAN is supported.
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)
System Mode
Native
Basic Hybrid - Layer 2
Basic Hybrid - Layer 3
Same as Sx500
Security: 802.1X Authentication
Authenticator Overview
WBA Supported
Yes
Yes
No
Yes
to

Advertisement

Table of Contents
loading

Table of Contents