Configuring Security
802. 1 X
STEP 1
STEP 2
Cisco Small Business 300 Series Managed Switch Administration Guide
802.1X Parameters Workflow
Define the 802. 1 X parameters as follows:
1. Set a time range(s) using the Time Range Page that is used in the Edit Port
Authentication Page. This is optional.
2. Define one or more static VLANs as unauthenticated VLANs as described in the
Defining 802.1X Properties
devices or ports can always send or receive packets to or from unauthenticated
VLANs. This is optional.
3. Define 802. 1 X settings for each port by using the Edit Port Authentication Page.
Note the following:
a. On this page, DVA can be activated on a port by selecting the RADIUS VLAN
Assignment field.
b. You can select the Guest VLAN field to have untagged incoming frames go
to the guest VLAN.
4. Define host authentication parameters for each port using the Port
Authentication Page.
5. View 802. 1 X authentication history using the Authenticated Hosts Page.
Defining 802.1X Properties
The 802. 1 X Properties Page is used to globally enable 802. 1 X. For 802. 1 X to
function, it must be activated both globally and individually on each port.
To define port-based authentication:
Click Security > 802.1X > Properties. The 802. 1 X Properties Page displays.
Enter the parameters.
•
Port Based Authentication—Enable or disable port-based, 802. 1 X
authentication.
•
Authentication Method—Select the user authentication methods. The
options are:
-
RADIUS, None—Perform port authentication first by using the RADIUS
server. If no response is received from RADIUS (for example, if the server
is down), then no authentication is performed, and the session is
permitted
.
section. 802. 1 x authorized and unauthorized
16
215
Need help?
Do you have a question about the SF 300-08 and is the answer not in the manual?
Questions and answers