Dell X1000 Networking X-Series Switches User Guide - Page 252

Dynamic VLAN Assignment, Guest VLAN, Dynamic Policy / ACL Assignment, Periodic Reauthentication,

Page 252 highlights

FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Network_Admin_Security.fm - Dynamic VLAN Assignment - Enable/disable dynamic VLAN assignment for this port. This feature enables you to automatically assign users to VLANs during the RADIUS server authentication. When a user is authenticated by the RADIUS server, the user is automatically joined to the VLAN configured on a RADIUS server. • Port Lock and Port Monitor should be disabled when DVA is enabled. • Dynamic VLAN Assignment (DVA) can occur only if a RADIUS server is configured, and port authentication is enabled and set to 802.1x multi-session mode. • If the RADIUS Accept Message does not contain the supplicant's VLAN, the supplicant is rejected. • Authenticated ports are added to the supplicant VLAN as untagged. • Authenticated ports remain unauthenticated VLAN and Guest VLAN members. Static VLAN configuration is not applied to the port. • The following list of VLANs cannot participate in DVA: an Unauthenticated VLAN, a Dynamic VLAN that was created by GVRP, a Voice VLAN, a Default VLAN and a Guest VLAN. • Delete the supplicant VLAN while the supplicant is logged in. The supplicant is authorized during the next re-authentication if this supplicant VLAN is re-created, or a new VLAN is configured on the RADIUS server. NOTE: DVA provides the same functionality as the MAC to VLAN Assignment feature, but does so in a standard way. Therefore, when DVA is available, MAC to VLAN Assignment is not available. - Guest VLAN - Enable/disable port access to the Guest VLAN. If enabled, unauthorized users, connected to this interface, can access the Guest VLAN. - Dynamic Policy / ACL Assignment - Enable/disable this feature. - Periodic Reauthentication - Select to enable port re-authentication attempts after the specified Reauthentication Period. - Reauthentication Period (300-4294967295) - Enter the number of seconds after which the selected port is reauthenticated. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - FOR PROOF ONLY 252 Network Administration: Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416

252
Network Administration: Security
FILE LOCATION:
C:\Users\gina\Desktop\Checkout_new\Dell Astute\User
Guide\Dell_Astute_Network_Admin_Security.fm
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
Dynamic VLAN Assignment
— Enable/disable dynamic VLAN
assignment for this port. This feature enables you to automatically
assign users to VLANs during the RADIUS server authentication.
When a user is authenticated by the RADIUS server, the user is
automatically joined to the VLAN configured on a RADIUS server.
Port Lock and Port Monitor should be disabled when DVA is
enabled.
Dynamic VLAN Assignment (DVA) can occur only if a RADIUS
server is configured, and port authentication is enabled and set to
802.1x multi-session mode.
If the RADIUS Accept Message does not contain the supplicant’s
VLAN, the supplicant is rejected.
Authenticated ports are added to the supplicant VLAN as
untagged.
Authenticated ports remain unauthenticated VLAN and Guest
VLAN members. Static VLAN configuration is not applied to the
port.
The following list of VLANs cannot participate in DVA: an
Unauthenticated VLAN, a Dynamic VLAN that was created by
GVRP, a Voice VLAN, a Default VLAN and a Guest VLAN.
Delete the supplicant VLAN while the supplicant is logged in.
The supplicant is authorized during the next re-authentication if
this supplicant VLAN is re-created, or a new VLAN is configured
on the RADIUS server.
NOTE:
DVA provides the same functionality as the MAC to VLAN Assignment
feature, but does so in a standard way. Therefore, when DVA is available,
MAC to VLAN Assignment is not available.
Guest VLAN
— Enable/disable port access to the Guest VLAN. If
enabled, unauthorized users, connected to this interface, can access
the Guest VLAN.
Dynamic Policy / ACL Assignment
— Enable/disable this feature.
Periodic Reauthentication
— Select to enable port re-authentication
attempts after the specified Reauthentication Period.
Reauthentication Period (300-4294967295)
— Enter the number of
seconds after which the selected port is reauthenticated.