Configuration Guide Vol. 2


8.2.1 Fixed VLAN

Prior to authentication, a terminal does not appear in the MAC address table and is unable to access the VLAN associated with the interface to which it is attached. If authentication succeeds, the switch adds the terminal's MAC address to the MAC address table, thus permitting access to the VLAN.

In the Switch, you can configure authentication at the following ports:

Tagged and untagged frames that enter a trunk port are handled as follows:

Figure 8-1: Trunk port handling

[Figure Data]

<Structure of this section>

(1) Local authentication method

The figure below describes local authentication using an internal Web authentication DB.

Figure 8-2: Configuration of the local authentication method in fixed VLAN

[Figure Data]

  1. A user of a PC connected via a hub opens a Web browser and accesses the Switch.

  2. The Switch compares the user ID and password entered by the user against the user information in the internal Web authentication DB.

  3. If authentication succeeds, a page appears on the PC indicating that authentication was successful.

  4. The authenticated PC is able to access servers in the VLAN associated with the port.

(2) RADIUS authentication-method

The figure below describes RADIUS authentication using a RADIUS server.

Figure 8-3: Configuration of RADIUS authentication-method in fixed VLAN

[Figure Data]

  1. A user of a PC connected via a hub opens a Web browser and accesses the Switch.

  2. Authentication takes place by comparing the user ID and password entered by the user against the user information registered on the RADIUS server.

  3. If authentication succeeds, a page appears on the PC indicating that authentication was successful.

  4. The authenticated PC is able to access servers in the VLAN associated with the port.