Reference Guide
...
Single Connect Administration
802.1x Authentication

Single Connect GUI Configuration

4min

Configurations in the Single Connect GUI are required as well:

  1. Create users and user groups. (See sections Manual User Creation and User Group Creation)
  2. Create device groups and add new devices to device groups. (See sections Creating User Groups and Adding Devices Manually)
  3. Create device group realms with the user groups and device groups defined in the previous steps (See section Creating Device Group Realms)

The devices added in step 2 must correspond to the last destination IP that sends an authentication request to Single Connect. For example, Wireless LAN Controller, Firewall etc.

  1. Define the authenticator secret key as globalSecretKey on the device group properties. (See section Device Groups Properties)
  2. Navigate to Administration> RADIUS 802.1x Config.
  3. Choose an EAP Type (only PEAP is currently available)
  4. Fill in the fields Certificate Authority PEM, Certificate Private Key PEM (which includes certificate and private key), and Certificate Private Key Password.
802.1x Configuration
802.1x Configuration


VLANs can be dynamically assigned by a RADIUS server to applicants requesting 802.1X authentication through that server. If dynamic VLAN is assigned to applicants, the following 2 settings must be set in Single Connect:

  1. Check the dynamic VLAN box in the 802.1x config screen
  2. The RADIUS Attribute Policy should be defined on the related user group as VLAN interval. See section Adding RADIUS/TACACS+ Attributes.
  • Check the Add Single Connect Server to Active Directory box and fill in the required fields:



802.1x Active Directory Configuration
802.1x Active Directory Configuration