Cisco 500 Series Administration Manual page 492

Stackable managed
Hide thumbs Also See for 500 Series:
Table of Contents

Advertisement

Security: 802.1X Authentication
Authenticator Overview
NOTE
Cisco 500 Series Stackable Managed Switch Administration Guide
SKU
SG500XG
When web-based authentication is not supported, guest VLAN and DVA
cannot be configured in multi-session mode.
When web-based authentication is supported, guest VLAN and DVA can be
configured in multi-session mode
Unauthenticated VLANs and the Guest VLAN
Unauthenticated VLANs and the guest VLAN provide access to services that do
not require the subscribing devices or ports to be 802.1X or MAC-Based
authenticated and authorized.
The guest VLAN is the VLAN that is assigned to an unauthorized client. You can
configure the guest VLAN and one or more VLANs to be unauthenticated in the
Security > 802.1X/MAC/Web Authentication > Properties page.
An unauthenticated VLAN is a VLAN that allows access by both authorized and
unauthorized devices or ports.
An unauthenticated VLAN has the following characteristics:
It must be a static VLAN, and cannot be the guest VLAN or the default VLAN.
The member ports must be manually configured as tagged members.
The member ports must be trunk and/or general ports. An access port
cannot be member of an unauthenticated VLAN.
The guest VLAN, if configured, is a static VLAN with the following characteristics:
It must be manually defined from an existing static VLAN.
The guest VLAN cannot be used as the Voice VLAN or an unauthenticated
VLAN.
See
VLAN and RADIUS-VLAN Assignment
which guest VLAN is supported.
System Mode
Same as Sx500
WBA Supported
Yes
to see a summary of the modes in
22
490

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents