Cisco Cisco SG200-26P 26-port Gigabit PoE Smart Switch メンテナンスマニュアル

ページ / 195
Security
802.1X
Cisco Small Business SF200E Series Advanced Smart Switch
172
10
 
Defining 802.1X Properties
Use the 802.1X Properties page to configure the global 802.1X administrative 
mode on the switch. 
To enable 802.1X security globally:
STEP 1
Click Security > 802.1X > Properties in the navigation window.
STEP  2
Select Enable for the Port Based Authentication State to allow 802.1X port-based 
authentication globally on the switch.
STEP  3
Select an authentication method from the Authentication Method list:
None—No authentication method is used.
Local—The switch performs local authentication of a remote supplicant 
based on EAP-MD5. The supplicant identification must be one of the 
management users configured on the switch (see 
).
RADIUS—The switch depends on one or more external RADIUS servers to 
perform the authentication. You must configure the supplicant identity and 
authentication directly the servers. (See 
 for information.) 
RADIUS, None—The switch depends on one or more external RADIUS 
servers to perform the authentication. (See description of RADIUS above.) If 
the switch cannot reach any servers, then no authentication is used.
RADIUS, Local—The switch depends on one or more external RADIUS 
servers to perform the authentication (see description of RADIUS above.) If 
the switch cannot reach any servers, it performs the authentication locally 
(see previous description of Local).
NOTE
When the (Radius, None) or the (Radius, Local) option is selected, 
None or Local is used only if the Radius Server specified is incorrect or it is 
not specified; if it is correct, but the credentials are incorrect, the 
authentication fails and does not fall back to the None or the Local option.
STEP  4
Click Apply. Your changes are saved to the Running Configuration.