Specifications
Authentication Configuration Example
April 15, 2011 Page 30 of 36
Figure 5 Stackable Fixed Switch Authentication Configuration Example Overview
OurconfigurationexampleconsistsofthefollowingstepsasshowninFigure 4andFigure 5and
describedinthesectionsthatfollow:
1. Configuringpolicies,RADIUS,andMultiAuthauthenticationontheswitch.
2. CreatingRADIUSuseraccountsontheauthenticationserver.
3. Configuringfortheengineeringgroup802.1xend‐userstations,includingtheIPphone
inthe
stackablefixedswitchconfiguration.
4. ConfiguringfortheengineeringgroupSiemensCEPdevicesforthemodularswi tch
configuration.ConfiguringtheprinterclusterMACauthenticationforthestackablefixed
switchconfiguration.
1
Stackable Switch
Configure policies
Enable RADIUS
Enable multi-user authentication
4
Printer cluster
MAC Authentication
Enable MAC authentication
Set MAC authentication password
Enable Port
3
Engineering end-user stations
802.1x authentication
Enable Eapol
Enable 802.1x
Set non-Authentication ports to force-auth
5
Public internet access
PWA Authentication
IP address: 10.10.10.201
Enable PWA
Configure IP address
Enable Enhance Mode
Enable Guest Status for RADIUS Authentification
Set Guest ID and Password
Enable Port
LAN Cloud
2
Radius Server 1
IP address: 10.20.10.01
Create RADIUS user accounts
Note: The modular switch and stackable fixed switch authentication examples are presented here
as a single discussion. Any input and information that is not applicable to both platform groups is
identified. All other information is applicable to both platform groups. The stackable fixed switch
example discussion assumes a C3 device authentication functionality.