Security: 802.1X Authentication
Authenticator Overview
Authenticator Overview
Cisco 500 Series Stackable Managed Switch Administration Guide
All of this is accomplished with no impact on end users or on network-attached
hosts. Open Access can be activated in the
Port Administrative Authentication States
The port administrative state determines whether the client is granted access to
the network.
The port administrative state can be configured in the Security > 802.1X/MAC/
Web Authentication > Port Authentication page.
The following values are available:
•
force-authorized
Port authentication is disabled and the port transmits all traffic in
accordance with its static configuration without requiring any
authentication. The switch sends the 802.1x EAP-packet with the EAP
success message inside when it receives the 802.1x EAPOL-start message.
This is the default state.
•
force-unauthorized
Port authentication is disabled and the port transmits all traffic via the guest
VLAN and unauthenticated VLANs. For more information see
and Session
Authentication. The switch sends 802.1x EAP packets with
EAP failure messages inside when it receives 802.1x EAPOL-Start
messages.
•
auto
Enables 802.1 x authentications in accordance with the configured port
host mode and authentication methods configured on the port.
Port Host Modes
Ports can be placed in the following port host modes (configured in the Security >
802.1X/MAC/Web Authentication > Host and Authentication page):
•
Single-Host Mode
802.1X Port Authentication
22
page.
Defining Host
484