Configuring Security
Configuring 802. 1 X
STEP 3
NOTE
STEP 1
STEP 2
STEP 3
Cisco Small Business 200 Series Smart Switch Administration Guide
•
Authentication Method—Select the user authentication methods. The
options are:
-
RADIUS, None—Perform port authentication first by using the RADIUS
server. If no response is received from RADIUS (for example, if the server
is down), then no authentication is performed, and the session is
permitted
.
-
RADIUS—Authenticate the user on the RADIUS server. If no
authentication is performed, the session is not permitted.
-
None—Do not authenticate the user. Permit the session.
Click Apply. The 802. 1 X properties are written to the Running Configuration file.
Defining 802.1X Port Authentication
The Port Authentication page enables configuration of 802. 1 X parameters for
each port. Since some of the configuration changes are only possible while the
Force Authorized
port is in
that you change the port control to
When the configuration is complete, return the port control to its previous state.
A port with 802. 1 x defined on it cannot become a member of a LAG.
To define 802. 1 X authentication:
Click Security > 802.1X > Port Authentication. The Port Authentication page is
displayed.
This page displays authentication settings for all ports.
Select a port, and click Edit. The Edit Port Authentication page is displayed.
Enter the parameters.
•
Interface—Select a port.
•
User Name—Displays the username of the port.
•
Current Port Control—Displays the current port authorization state. If the
state is Authorized, the port is either authenticated or the Administrative
Port Control is Force Authorized. Conversely, if the state is Unauthorized,
then the port is either not authenticated or the Administrative Port Control is
Force Unauthorized.
state, such as host authentication, it is recommended
Force Authorized
17
before making changes.
244