User Manual

Table Of Contents
Insight Managed 8-Port Gigabit (Hi-Power) PoE+ Smart Cloud Switch with NETGEAR FlexPoE Power
Manage Switch Security User Manual297
Configure global 802.1X settings
You can configure global port access control settings on the switch.
To globally enable all 802.1X features:
1. Connect your computer to the same network as the switch.
You can use a WiFi or wired connection to connect your computer to the network, or
connect directly to a switch that is off-network using an Ethernet cable.
2. Launch a web browser.
3. In the address field of your web browser, enter the IP address of the switch.
For information about finding the IP address of the switch, see Access the switch on
page 14.
The Local Device Login page displays.
If you did not yet register the switch with your NETGEAR account, the Register to unlock
all features page displays. For more information, see
Register and access the switch with
your NETGEAR account on page 29.
4. Enter one of the following passwords:
After registration, enter your customized local device password.
If you previously added the switch to an Insight network location, enter the Insight
network password.
For more information about the local device password and the Insight network password,
see
Credentials for the local browser UI on page 28.
5. Click the Login button.
The System Information page displays.
6. Select Security > Port Authentication > Basic > 802.1X Configuration.
The 802.1X Configuration page displays.
7. Next to Port Based Authentication State, select the Enable radio button.
This enables or disables 802.1X administrative mode on the switch.
Note: If 802.1X is enabled, authentication is performed by a RADIUS server.
This means that the primary authentication method must be RADIUS.
To set the method, select Security > Management Security >
Authentication List and select RADIUS as method 1 for defaultList.
For more information, see
Configure authentication lists on
page 279.
When port-based authentication is globally disabled, the switch does not check for
802.1X authentication before allowing traffic on any ports, even if the ports are configured
to allow only authenticated users.