Table 106 Relationships of the 802.1X guest VLAN and other security features
Feature | Relationship description | |
MAC authentication guest VLAN on a port that | Only the 802.1X guest VLAN take effect. A user that | |
fails MAC authentication will not be assigned to the | ||
performs | ||
MAC authentication guest VLAN. | ||
| ||
|
| |
802.1X | The 802.1X | |
| ||
|
| |
| The 802.1X guest VLAN function has higher priority | |
Port intrusion protection on a port that performs | than the block MAC action, but it has lower priority | |
than the shutdown port action of the port intrusion | ||
| protection feature. | |
|
|
Configuring an
Configuration prerequisites
•Create the VLAN to be specified as the 802.1X
•If the
Configuration guidelines
•The 802.1X
•Assign different IDs to the port VLAN and the 802.1X
•Use Table 107 when configuring multiple security features on a port. Table 107 Relationships of the 802.1X
Feature | Relationship description | |
MAC authentication guest VLAN on a port that | The 802.1X | |
performs | ||
| ||
|
| |
| The 802.1X | |
Port intrusion protection on a port that performs | than the block MAC action, but it has lower priority | |
than the shutdown port action of the port intrusion | ||
| protection feature. | |
|
|
Network requirements
As shown in Figure 311, the access device performs 802.1X authentication for users that connect to port GigabitEthernet 1/0/1. Implement
336