Cisco SR224T-NA Administration Guide - Page 242

X Parameters Workflow, Defining 802.1X Properties, Configuring Security

Page 242 highlights

Configuring Security Configuring 802.1X 17 • Multi-Session 802.1X-Every device (supplicant) connecting to a port must be authenticated and authorized by the switch (authenticator) separately in a different 802.1x session. The switch supports the 802.1x authentication mechanism, as described in the standard, to authenticate and authorize 802.1x supplicants. 802.1X Parameters Workflow Define the 802.1X parameters as follows: • (Optional) Define one or more static VLANs as unauthenticated VLANs as described in the Defining 802.1X Properties section. 802.1x authorized and unauthorized devices or ports can always send or receive packets to or from unauthenticated VLANs. • Define 802.1X settings for each port by using the Edit Port Authentication page. Note the following: • You can select the Guest VLAN field to have untagged incoming frames go to the guest VLAN. • Define host authentication parameters for each port using the Port Authentication page. • View 802.1X authentication history using the Authenticated Hosts page. Defining 802.1X Properties The 802.1X Properties page is used to globally enable 802.1X and define how ports are authenticated. For 802.1X to function, it must be activated both globally and individually on each port. To define port-based authentication: STEP 1 Click Security > 802.1X > Properties. The Properties page is displayed. STEP 2 Enter the parameters. • Port-Based Authentication-Enable or disable port-based, 802.1X authentication. Cisco Small Business 200 Series Smart Switch Administration Guide 243

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283

Configuring Security
Configuring 802.1X
Cisco Small Business 200 Series Smart Switch Administration Guide
243
17
Multi-Session 802.1X
—Every device (supplicant) connecting to a port
must be authenticated and authorized by the switch (authenticator)
separately in a different 802.1x session.
The switch supports the 802.1x authentication mechanism, as described in the
standard, to authenticate and authorize 802.1x supplicants.
802.1X Parameters Workflow
Define the 802.1X parameters as follows:
(Optional) Define one or more static VLANs as unauthenticated VLANs as
described in the
Defining 802.1X Properties
section. 802.1x authorized
and unauthorized devices or ports can always send or receive packets to or
from unauthenticated VLANs.
Define 802.1X settings for each port by using the
Edit Port Authentication
page.
Note the following:
You can select the Guest VLAN field to have untagged incoming frames go
to the guest VLAN.
Define host authentication parameters for each port using the
Port
Authentication
page.
View 802.1X authentication history using the
Authenticated Hosts
page.
Defining 802.1X Properties
The
802.1X Properties
page is used to globally enable 802.1X and define how
ports are authenticated. For 802.1X to function, it must be activated both globally
and individually on each port.
To define port-based authentication:
STEP 1
Click
Security
>
802.1X
>
Properties
. The
Properties
page is displayed.
STEP
2
Enter the parameters.
Port-Based Authentication
—Enable or disable port-based, 802.1X
authentication.