Cisco SF500-24 Administration Manual page 328

500 series stackable managed switch
Hide thumbs Also See for SF500-24:
Table of Contents

Advertisement

Configuring Security
Configuring 802. 1 X
NOTE
Cisco 500 Series Stackable Managed Switch Administration Guide
no longer using the port or the access is to the unauthenticated VLAN or
guest VLAN.
-
Single session/multiple hosts—This follows the 802. 1 x standard. In this
mode, the switch as an authenticator allows any device to use a port as
long as it has been granted permission.
Multi-Session 802.1X—Every device (supplicant) connecting to a port
must be authenticated and authorized by the switch (authenticator)
separately in a different 802. 1 x session. This is the only mode that supports
Dynamic VLAN Assignment (DVA).
DVA is not supported when the switch is in Layer 3 mode.
Dynamic VLAN Assignment (DVA)
Dynamic VLAN Assignment (DVA) is also referred to as RADIUS VLAN Assignment
in this guide. When a port is in Multiple Session mode and is DVA-enabled, the
switch automatically adds the port as an untagged member of the VLAN that is
assigned by the RADIUS server during the authentication process. The switch
classifies untagged packets to the assigned VLAN if the packets originated from
the devices or ports that are authenticated and authorized.
For a device to be authenticated and authorized at a port which is DVA-enabled:
The RADIUS server must authenticate the device and dynamically assign a
VLAN to the device.
The assigned VLAN must not be the default VLAN and must have been
created on the switch.
The switch must not be configured to use both a DVA and a MAC-based
VLAN group together.
A RADIUS server must support DVA with RADIUS attributes tunnel-type
(64) = VLAN (13), tunnel-media-type (65) = 802 (6), and tunnel-private-
group-id = a VLAN ID.
Authentication Methods
The authentication methods can be:
802. 1 x—The switch supports the authentication mechanism as described in
the standard to authenticate and authorize 802. 1 x supplicants.
MAC-based—The switch can be configured to use this mode to
authenticate and authorized devices that do not support 802. 1 x. The switch
emulates the supplicant role on behalf of the non 802. 1 x capable devices,
18
319

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents