Cisco SR224T-NA Administration Guide - Page 242
X Parameters Workflow, Defining 802.1X Properties, Configuring Security
View all Cisco SR224T-NA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 242 highlights
Configuring Security Configuring 802.1X 17 • Multi-Session 802.1X-Every device (supplicant) connecting to a port must be authenticated and authorized by the switch (authenticator) separately in a different 802.1x session. The switch supports the 802.1x authentication mechanism, as described in the standard, to authenticate and authorize 802.1x supplicants. 802.1X Parameters Workflow Define the 802.1X parameters as follows: • (Optional) Define one or more static VLANs as unauthenticated VLANs as described in the Defining 802.1X Properties section. 802.1x authorized and unauthorized devices or ports can always send or receive packets to or from unauthenticated VLANs. • Define 802.1X settings for each port by using the Edit Port Authentication page. Note the following: • You can select the Guest VLAN field to have untagged incoming frames go to the guest VLAN. • Define host authentication parameters for each port using the Port Authentication page. • View 802.1X authentication history using the Authenticated Hosts page. Defining 802.1X Properties The 802.1X Properties page is used to globally enable 802.1X and define how ports are authenticated. For 802.1X to function, it must be activated both globally and individually on each port. To define port-based authentication: STEP 1 Click Security > 802.1X > Properties. The Properties page is displayed. STEP 2 Enter the parameters. • Port-Based Authentication-Enable or disable port-based, 802.1X authentication. Cisco Small Business 200 Series Smart Switch Administration Guide 243