802.1X........................................................................................................................................................................................ 230

Guest VLANs..............................................................................................................................................................................................235
Limitations Using the Guest VLAN ......................................................................................................................................................235
Configure 802.1X Guest VLAN .................................................................................................................................................................235
Configure 802.1X Authenticator.................................................................................................................................................................237
802.1X User................................................................................................................................................................................................240
Initialize Port(s) ..........................................................................................................................................................................................240
Reauthenticate Port(s).................................................................................................................................................................................242
Authentic RADIUS Server..........................................................................................................................................................................243
Web-based Access Control (WAC) ........................................................................................................................................... 245
Conditions and Limitations.........................................................................................................................................................................245
WAC Global State ......................................................................................................................................................................................245
WAC Port Settings......................................................................................................................................................................................247
WAC User Account....................................................................................................................................................................................249
WAC Host Table Settings...........................................................................................................................................................................250
Trust Host................................................................................................................................................................................... 251
Access Authentication Control................................................................................................................................................... 252
Authentication Policy & Parameter Settings...............................................................................................................................................253
Application's Authentication Settings.........................................................................................................................................................253
Authentication Server Group ......................................................................................................................................................................254
Authentication Server Host.........................................................................................................................................................................255
Login Method Lists.....................................................................................................................................................................................257
Enable Method Lists...................................................................................................................................................................................258
Configure Local Enable Password..............................................................................................................................................................260
Enable Admin.............................................................................................................................................................................................261
RADIUS Accounting Settings ....................................................................................................................................................................262
MAC-based Access Control (MAC).......................................................................................................................................... 264
Notes about MAC-based Access Control....................................................................................................................................................264
MAC-based Access Control Global Settings ..............................................................................................................................................264
MAC-based Access Control Local MAC Settings......................................................................................................................................267
Safeguard Engine....................................................................................................................................................................... 268
Safeguard Engine Settings ..........................................................................................................................................................................269
Traffic Segmentation.................................................................................................................................................................. 270
Secure Socket Layer (SSL)........................................................................................................................................................ 271
SSL............................................................................................................................................................................................. 272
Secure Shell (SSH)..................................................................................................................................................................... 273
SSH Server Configuration...........................................................................................................................................................................274
SSH Authentication Mode and Algorithm Settings ....................................................................................................................................275
SSH User Authentication Mode..................................................................................................................................................................277
Compound Authentication......................................................................................................................................................... 278
Compound Authentication Settings.............................................................................................................................................................278
Authentication Guest VLAN Settings.........................................................................................................................................................280
JWAC (Japanese Web-based Access Control)........................................................................................................................... 281
JWAC Global Configuration.......................................................................................................................................................................281
JWAC Port Settings....................................................................................................................................................................................284