User guide
Using Port-Based Security
Chapter 13: Setting Your Security Policy 415
Configuring Port-Based Security
To configure 802.1x port-based security for a port
1. Do one of the following:
• To use the Safe@Office EAP authenticator for authenticating clients, follow
the workflow Using the Safe@Office EAP Authenticator for Authentication
of Wired Clients on page 435.
You will be referred back to this procedure at the appropriate stage in the
workflow, at which point you can continue from the next step.
• To use a RADIUS server for authenticating clients, do the following:
1) Configure a RADIUS server.
See Using RADIUS Authentication on page 688.
2) Configure the clients for 802.1x authentication.
For information, refer to your RADIUS server documentation.
2. To configure dynamic VLAN assignment, do the following:
a. Add port-based VLAN networks as needed.
See Adding and Editing Port-Based VLANs on page 220.
b. Configure RADIUS option 81 [Tunnel-Private-Group-ID] on the
RADIUS server.
For information, refer to your RADIUS server documentation.
This step is only relevant when using a RADIUS server.
3. To configure a Quarantine network other than the LAN or DMZ, add a port-
based VLAN network.
See Adding and Editing Port-Based VLANs on page 220.
4. Click Network in the main menu, and click the Ports tab.