Security
Configuring 802.1X
Cisco Small Business 200 Series Smart Switch Administration Guide 266
17
• (Optional) Define one or more static VLANs as unauthenticated VLANs as
described in the Defining 802.1X Properties section. 802.1x authorized
and unauthorized devices or ports can always send or receive packets to or
from unauthenticated VLANs.
• Define 802.1X settings for each port by using the Edit Port Authentication
page.
Note the following:
• You can select the Guest VLAN field to have untagged incoming frames go
to the guest VLAN.
• Define host authentication parameters for each port using the Port
Authentication page.
• View 802.1X authentication history using the Authenticated Hosts page.
Defining 802.1X Properties
The 802.1X Properties page is used to globally enable 802.1X and define how
ports are authenticated. For 802.1X to function, it must be activated both globally
and individually on each port.
To define port-based authentication:
STEP 1 Click Security > 802.1X > Properties.
STEP 2 Enter the parameters.
• Port-Based Authentication—Enable or disable port-based, 802.1X
authentication.
• Authentication Method—Select the user authentication methods. The
options are:
- RADIUS, None—Perform port authentication first by using the RADIUS
server. If no response is received from RADIUS (for example, if the server
is down), then no authentication is performed, and the session is
permitted
.
- RADIUS—Authenticate the user on the RADIUS server. If no
authentication is performed, the session is not permitted.
- None—Do not authenticate the user. Permit the session.