Overview of Security Methods
20-2 Security Configuration
authenticateandgrantappropriateaccesstoenduserdevicescommunicatingwithG‐Series
ports.FordetailsonusingCLIcommandstoconfigure802.1X,referto“Configuring802.1X
Authentication”onpage 20‐10.
•MACAuthentication–providesamechanismforadministratorstosecurelyauthenticate
sourceMACaddressesandgrantappropriateaccessto
enduserdevicescommunicatingwith
G‐Seriesports.Fordetails,referto“ConfiguringMACAuthentication”onpage 20‐19.
•MultipleAuthenticationMethods–allowsuserstoauthenticateusingmultiplemethodsof
authenticationonthesameport.Fordetails,referto“ConfiguringMultipleAuthentication
Methods”onpage 20‐30.
•RFC3580TunnelAttributes
provideamechanismtocontainan802.1XauthenticatedorMA C
authenticatedusertoaVLANregardlessofthe PVID.Uptoeightuserscanbeconfiguredper
Gigabitport.Referto“ConfiguringVLANAuthorization(RFC3580)”onpage 20‐41.
•MACLocking–locksaporttooneormoreMAC
addresses,preventingtheuseof
unauthorizeddevicesandMACspoofingontheportFordetails,referto“ConfiguringMAC
Locking”onpage 20‐46.
•PortWebAuthentication(PWA)–passesalllogininform ationfromtheendstationtoa
RADIUSserverforauthenticationbeforeallowingausertoaccessthenetwork
.PWAisan
alternativeto802.1XandMACauthentication.Fordetails,referto“ConfiguringPortWeb
Authentication(PWA)”onpage 20‐57.
•SecureShell(SSH)–providessecureTelnet.Fordetails,referto“ConfiguringSecureShell
(SSH)”onpage 20‐68.
•IPAccessLists(ACLs)–permitsordeniesaccess
toroutinginterfacesbasedonprotocoland
inboundand/oroutboundIPaddressrestrictionsconfiguredinaccesslists.Fordetails,referto
“ConfiguringAccessLists”onpage 20‐70.
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment
IfyouconfigureanauthenticationmethodthatrequirescommunicationwithaRADIUSserver,
youcanusetheRADIUSFilter‐IDattributetodynamicallyassignapolicyprofileand/or
managementleveltoauthenticatingusersand/ordevices.
TheRADIUSFilter‐IDattributeissimplyastringthatisformattedintheRADIUSAccess‐
Accept
packetsentbackfromtheRADIUSservertotheswitchduringtheauthenticationprocess.
EachusercanbeconfiguredintheRADIUSserverdatabasewithaRADIUS Filter‐IDattribute
thatspecifiesthenameofthepolicyprofileand/ormanagementleveltheusershouldbeassigned
uponsuccessfulauthentication.During
theauthenticationprocess,whentheRADIUSserver
returnsaRADIUSAccess‐AcceptmessagethatincludesaFilter‐IDmatchingapolicyprofilename
configuredontheswitch,theswitchthendynamicallyappliesthepolicyprofiletothephysical
porttheuser/deviceisauthenticatingon.
Note: To configure EAP pass-through, which allows client authentication packets to be forwarded
through the switch to an upstream device, 802.1X authentication must be globally disabled with the
set dot1x command.
Notes: The G3 supports up to eight authenticated users per port.
The G3 cannot simultaneously support Policy and RFC 3580 on the same port. If multiple users are
configured to use a port, and the G3 is then switched from "policy" mode to "tunnel" mode (RFC-
3580 VLAN to port mapping), the total number of users supported to use a port will be reset to one.
RFC-3580 VLAN authorization is not supported by PWA authentication.