Cisco 350 Series Administration Manual page 526

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

Security: 802.1X Authentication
Overview
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
After authentication is completed, the switch forwards all traffic arriving from the client on the
port, as shown in the figure below.
Figure 3 WEB-Based Authentication
HTTP
Client
Authenticaticator
Web-based authentication cannot be configured on a port that has the guest VLAN or
RADIUS-Assigned VLAN feature enabled.
Web-based authentication supports the following pages:
Login page
Login Success page
There is a predefined, embedded set of these pages.
These pages can be modified in the
You can preview each of the customized pages. The configuration is saved into the Running
Configuration file.
Unauthenticated VLANs and the Guest VLAN
Unauthenticated VLANs and the guest VLAN provide access to services that do not require
the supplicant devices or ports to be authenticated and authorized.
The guest VLAN is the VLAN that is assigned to an unauthorized client. You can configure
the guest VLAN and one or more VLANs to be unauthenticated in the
An unauthenticated VLAN is a VLAN that allows access by both authorized and unauthorized
devices or ports.
An unauthenticated VLAN has the following characteristics:
It must be a static VLAN, and cannot be the guest VLAN or the default VLAN.
The member ports must be manually configured as tagged members.
The member ports must be trunk and/or general ports. An access port cannot be
member of an unauthenticated VLAN.
RADIUS Protocol
EAP Protocol
Authentication
WEB-Based Authentication
Server
page.
Properties
page.
18
355

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents