Versionen im Vergleich

Schlüssel

  • Diese Zeile wurde hinzugefügt.
  • Diese Zeile wurde entfernt.
  • Formatierung wurde geändert.

...

1) Connect to the web interface of the device and navigate to the menu System → AAA → Authentication List.

Calling up the Authentication List menuImage Modified

2) Select the entry dot1xList and then click Edit.

Edit dot1xList in the Authentication ListImage Modified

3) Under Available Methods select the option Radius and click the upper “arrow” icon to move it into the Selected Methods. Then click Submit.

Info

The option Radius must be stored here, otherwise the switch will not forward the RADIUS requests to the RADIUS server.

Add the RADIUS protocol to the dot1xListImage Modified

Apply changes with SubmitImage Modified

4) Go to the menu Security → Port Access Control → Configuration.

Calling up the Port Access Control ConfigurationImage Modified

5) Under Admin mode, select the option Enable and click Submit.

Activating port access controlImage Modified

6) Go to the menu Security → RADIUS → Named Server.

Calling up the RADIUS Named ServerImage Modified

7) Click Add to add a RADIUS server.

Add entry for RADIUS serverImage Modified

8) Modify the following parameters and then click Submit:

  • IP Address/Host Name: Enter the IP address or host name of the RADIUS server from which the switch obtains the Dynamic ACL.
  • Server Name: If necessary, adjust the name for the RADIUS server (in this example the name was left as the default setting Default-RADIUS-Server).  
  • Port Number: Leave the RADIUS port as the default value 1812.
  • Secret: Enter the Client Secret set on the RADIUS server.
  • Server Type: Select the option Primary
  • Message Authenticator: Check that the option Enabled is selected.

Enter parameters for RADIUS serverImage Modified

9) Change to the menu Security → Authentication Manager → Interface Configuration.

Hinweis

At this point, under no circumstances should the Admin Mode under Security → Authentication Manager → Configuration be activated (Enable), because authentication is enabled globally for all ports. Otherwise, configuration access to the switch is no longer possible!

Calling up the Authentication Manager Interface ConfigurationImage Modified

Info

The status of the Named Server under Current only changes to True when the switch receives a RADIUS request. 

RADIUS server in True status after receiving a RADIUS requestImage Modified

10) Select the interface used for configuration access (in this example the port 1/0/9), under Control Mode select the option Force Authorized and click Submit. With this setting, no authentication is performed on this port.

Info

Select Force Authorized for all ports on which no authentication should be performed.

Set Forced Authorized mode for management access to the switchImage Modified

11) Select a port on which authentication should be performed (in this example 1/0/10), adjust the following parameters and click Submit:

...

Info

Since Dynamic ACLs are usually used to deny or allow data traffic to individual devices, this example has the Host Mode set to Single Authentication. If several devices are to be connected to this port (e.g. via an access point), the mode Multiple Domain/Host is required.

Set 802.1X authentication with single authentication for a portImage Modified

12) On the Configuration tab, set the Admin Mode to the option Enable and click Submit.

Activating the Authentication ManagerImage Modified

13) Click on Save Configuration in the top right-hand corner to save the configuration as the start configuration.

Info

The start configuration is retained even if the device is restarted or there is a power failure.

As an alternative, the current configuration can be saved as the start configuration from the command line with the command write memory.

Saving the switch configuration as the start configurationImage Modified

14) Confirm your changes by clicking OK.

Confirm saving the start configurationImage Modified