Step 3: Configuring Layer 2 Enforcement
Layer 2 enforcement means controlling network access at the point where the user attaches to the network. In a wired network, this control is at the switch port; in a wireless network the control is at the wireless access point. The network access control is accomplished through 802.1X authentication protocol (implemented on the switch or wireless AP) in conjunction with RADIUS return attributes to control switch or AP operation such as VLAN assignment and filtering.
The following enforcements are supported for the devices connecting to the network.
•802.1X
•MAC Authentication
•SNMP
Profiling is enabled by default when you enable enforcement and authentication.
Configure the enforcement for devices, which includes laptops, smart phones, VOIP phones, and unmanaged devices.
If profiling is enabled the device platform types are automatically enabled.
Device Type |
Platforms |
Authentication Type |
Additional Support |
---|---|---|---|
Laptops |
•Windows •MAC •Linux |
•802.1X •SNMP |
Host Checker |
Smart phones |
•Android •iOS |
802.1X |
NA |
VOIP phones |
NA |
•802.1X •MAC |
NA |
Unmanaged devices |
NA |
MAC |
NA |