Guest Vlans; Limitations Using The Guest Vlan - D-Link DES-3526 - Switch - Stackable User Manual

Xstack des-3500 series layer 2 managed stackable fast ethernet switch
Hide thumbs Also See for DES-3526 - Switch - Stackable:
Table of Contents

Advertisement

xStack
This window displays the following information:
Parameter
Description
Succession
RADIUS Server
Authentic Port
Accounting Port
Key
Confirm Key
Accounting Method

Guest VLANs

On 802.1x security enabled networks, there is a need for non
802.1x supported devices to gain limited access to the network,
due to lack of the proper 802.1x software or incompatible
devices, such as computers running Windows 98 or lower
operating systems, or the need for guests to gain access to the
network without full authorization. To supplement these
circumstances, this switch now implements Guest 802.1x
VLANs. These VLANs should have limited access rights and
features separate from other VLANs on the network.
To implement Guest 802.1x VLANs, the user must first create a
VLAN on the network with limited rights and then enable it as an
802.1x guest VLAN. Then the administrator must configure the
guest accounts accessing the Switch to be placed in a Guest
VLAN when trying to access the Switch. Upon initial entry to the
Switch, the client wishing services on the Switch will need to be
authenticated by a remote RADIUS Server or local authentication
on the Switch to be placed in a fully operational VLAN. If
authenticated and the authenticator posseses the VLAN
placement information, that client will be accepted into the fully
operational target VLAN and normal switch functions will be
open to the client. If the authenticator does not have target VLAN
placement information, the client will be returned to its
originating VLAN. Yet, if the client is denied authentication by
the authenticator, it will be placed in the Guest VLAN where it
has limited rights and access. The adjacent figure should give the
user a better understanding of the Guest VLAN process.

Limitations Using the Guest VLAN

1. Guest VLANs are only supported for port-based VLANs. MAC-based VLANs cannot undergo this procedure.
2. Ports supporting Guest VLANs cannot be GVRP enabled and vice versa.
3. A port cannot be a member of a Guest VLAN and a static VLAN simultaneously.
4. Once a client has been accepted into the target VLAN, it can no longer access the Guest VLAN.
5. If a port is a member of multiple VLANs, it cannot become a member of the Guest VLAN.
®
DES-3500 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
Choose the desired RADIUS server to configure: First, Second or Third.
Set the RADIUS server IP.
Set the RADIUS authentic server(s) UDP port. The default port is 1812.
Set the RADIUS account server(s) UDP port. The default port is 1813.
Set the key the same as that of the RADIUS server.
Confirm the shared key is the same as that of the RADIUS server.
This allows you to Add/Modify or Delete the RADIUS Server.
Figure 7- 20. Guest VLAN Authentication Process
168

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Des-3550Des-3526dcDes-3526d

Table of Contents