•
RADIUS Servers—Specifies the RADIUS server to be used for authentication. Select
the corresponding check box to specify a server. Click Add or Edit to add or modify
the RADIUS server settings. Enter information as specified in Table 39 on page 74.
•
Exclusion List—Excludes hosts from the 802.1X authentication list by specifying the
MAC address. Click Add or Edit in the Exclusion List screen to include or modify the
MAC addresses. Enter information as specified in Table 40 on page 74.
•
Edit—Specifies 802.1X settings for the selected interface
•
Apply 802.1X Profile—Applies an 802.1X profile based on the port role. If a message
appears asking whether you want to configure a RADIUS server, click Yes.
•
802.1X Configuration—Configures custom 802.1X settings for the selected
interface. If a message appears asking whether you want to configure a RADIUS
server, click Yes. Enter information as specified in Table 39 on page 74. To
configure 802.1X port settings, enter information as specified in
Table 41 on page 75.
•
Delete—Deletes 802.1X authentication configuration on the selected interface.
Table 39: RADIUS Server Settings
Your ActionFunctionField
Enter the IP address in dotted decimal
notation.
Specifies the IP address of the server.IP Address
Enter the password.Specifies the login password.Password
Reenter the password.Verifies the login password for the server.Confirm Password
Type the port number.Specifies the port with which the server is associated.Server Port Number
Type the IP address in dotted decimal
notation.
Specifies the source address of the switch using which
the switch can communicate with the server.
Source Address
Type the number.Specifies the number of login retries allowed after a
login failure.
Retry Attempts
Type the interval in seconds.Specifies the time interval to wait before the connection
to the server is closed.
Timeout
Table 40: 802.1X Exclusion List
Your ActionFunctionField
Enter the MAC address.Specifies the MAC address to be excluded from
802.1X authentication.
MAC Address
Select to enable the option. Select the port
through which the host is connected.
Specifies that the host can bypass authentication
if it is connected through a particular interface.
Exclude if connected
through the port
Copyright © 2017, Juniper Networks, Inc.74
J-Web Application Package User Guide for EX Series Switches, Release 14.1X53-A1