Properties - Cisco 350 Series Administration Manual

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

18
STEP 5

Properties

STEP 1
STEP 2
364
The fields in this page are described in Port Authentication.
Click Apply, and the Running Configuration file is updated.
The Properties page is used to globally enable port/device authentication. For authentication to
function, it must be activated both globally and individually on each port.
To define port-based authentication:
Click Security > 802.1X Authentication > Properties.
Enter the parameters.
Port-Based Authentication—Enable or disable port-based authentication.
If this is disabled, 802.1X, MAC-based and web-based authentication and 802.1x
supplicant are disabled.
Authentication Method—Select the user authentication methods. The options are:
-
RADIUS, None—Perform port authentication first by using the RADIUS server. If
no response is received from RADIUS (for example, if the server is down), then no
authentication is performed, and the session is permitted
but the user credentials are incorrect, access is denied and the session terminated.
-
RADIUS—Authenticate the user on the RADIUS server. If no authentication is
performed, the session is not permitted.
-
None—Do not authenticate the user. Permit the session.
Guest VLAN—Select to enable the use of a guest VLAN for unauthorized ports. If a
guest VLAN is enabled, all unauthorized ports automatically join the VLAN selected in
the Guest VLAN ID field. If a port is later authorized, it is removed from the guest
VLAN.
The guest VLAN can be defined as a layer 3 interface (assigned an IP address) like any
other VLAN. However, device management is not available via the guest VLAN IP
address.
Guest VLAN ID—Select the guest VLAN from the list of VLANs.
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
Security: 802.1X Authentication
Properties
If the server is available
.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents