Configuring Security
802.1X
Cisco Small Business 300 Series Managed Switch Administration Guide  213
16
 
For a device to be authenticated and authorized at a port with DVA enabled:
• The RADIUS server must authenticate the device and dynamically assign a 
VLAN to the device.
• The assigned VLAN must not be the default VLAN and must have been 
created at the switch. 
• The switch must not be configured to use both a DVA and a MAC-based 
VLAN group together. 
• A RADIUS server must support DVA with RADIUS attributes tunnel-type 
(64) = VLAN (13), tunnel-media-type (65) = 802 (6), and tunnel-private-
group-id = a VLAN ID.
Authentication Methods
The authentication methods can be:
• 802.1x—The switch supports the authentication mechanism as described in 
the standard to authenticate and authorize 802.1x supplicants.
• MAC-based—The switch can be configured to use this mode to 
authenticate and authorized devices that do not support 802.1x. The switch 
emulates the supplicant role on behalf of the non 802.1x capable devices, 
and uses the MAC address of the devices as the username and password 
when communicating with the RADIUS servers. MAC addresses for 
username and password must be entered in lower case and with no 
deliminating characters (for example: aaccbb55ccff). To use MAC-based 
authentication at a port:
- A Guest VLAN must be defined
- The port must be Guest VLAN enabled.
- The packets from the first supplicant at the port before it is authorized 
must be untagged packets.
You can configure a port to use 802.1x, MAC-based, or 802.1x and MAC-based 
authentication. If a port is configured to use both 802.1x and MAC-based 
authentication, 802.1x supplicant has precedence over non-802.1x device. The 
802.1x supplicant preempts an authorized but non-802.1x device at a port that is 
configured with a single session.