Step 3: Configuring Layer 2 Enforcement

Layer 2 enforcement means controlling network access at the point where the user attaches to the network. In a wired network, this control is at the switch port; in a wireless network the control is at the wireless access point. The network access control is accomplished through 802.1X authentication protocol (implemented on the switch or wireless AP) in conjunction with RADIUS return attributes to control switch or AP operation such as VLAN assignment and filtering.

The following enforcements are supported for the devices connecting to the network.

  • 802.1X
  • MAC Authentication
  • SNMP

Profiling is enabled by default when you enable enforcement and authentication.

Configure the enforcement for devices, which includes laptops, smart phones, VOIP phones, and unmanaged devices.

If profiling is enabled the device platform types are automatically enabled.

Device Type

Platforms

Authentication Type

Additional Support

Laptops

  • Windows
  • MAC
  • Linux
  • 802.1X
  • SNMP

Host Checker

Smart phones

  • Android
  • iOS

802.1X

NA

VOIP phones

NA

  • 802.1X
  • MAC

NA

Unmanaged devices

NA

MAC

NA