Configuration Guide Vol. 2


8.2.3 Legacy Mode

This mode is an operating mode that was provided by the name Dynamic VLAN Mode in AX6000S series, AX3630S,, and AX2430S versions earlier than Ver.10.7. Use this option when you want to apply the Switch to a network that was built using Web authentication function prior to Ver.10.7.

In this mode, the native VLAN is designated as the pre-authentication VLAN, and a MAC VLAN is designated as the post-authentication VLAN. Prior to authentication, the MAC address of the terminal is associated with the pre-authentication VLAN. If authentication succeeds, the switch associates the MAC address with the post-authentication VLAN. For this to work, the following configuration is required:

<Structure of this section>

(1) Local authentication method

The figure below describes local authentication using an internal Web authentication DB.

Figure 8-6 Web Authentication System Configuration Diagram (Local Authentication Method)

[Figure Data]

  1. A user of a PC connected via a hub opens a Web browser and accesses the Switch.

  2. The Switch compares the user ID and password entered by the user against the user information in the internal Web authentication DB.

  3. If authentication succeeds, a page appears on the PC indicating that authentication was successful, and the PC gains membership to the post-authentication VLAN.

  4. The authenticated PC is able to access servers in the post-authentication VLAN.

(2) RADIUS authentication-method

The figure below describes RADIUS authentication using a RADIUS server.

Figure 8-7 Web Authentication System Configuration Diagram (RADIUS Authentication Method)

[Figure Data]

  1. A user of a PC connected via a hub opens a Web browser and accesses the Switch.

  2. Authentication takes place by comparing the user ID and password entered by the user against the user information registered on the RADIUS server.

  3. If authentication succeeds, a page appears on the PC indicating that authentication was successful, and the PC gains membership to the post-authentication VLAN.

  4. The authenticated PC is able to access servers in the post-authentication VLAN.