Reference Guide
...
802.1x Authentication
Single Connect GUI Configuration
4 min
configurations in the single connect gui are required as well create users and user groups (see sections docid\ lripjdnxq5g30bfjomrj8 and docid\ cqjw9kmgk4tj4f2ziimia ) create device groups and add new devices to device groups (see sections docid\ o8hz2wtscs9ykocfa0w1t and docid\ dhv5dvycmfjymaz4uy2hk ) create device group realms with the user groups and device groups defined in the previous steps (see section docid\ hrdzkllxbj3ljne9fvbir ) the devices added in step 2 must correspond to the last destination ip that sends an authentication request to single connect for example, wireless lan controller, firewall etc define the authenticator secret key as globalsecretkey on the device group properties (see section docid\ bjl a s0o5hovdjhprd g ) navigate to administration > radius 802 1x config choose an eap typ e (only peap is currently available) fill in the fields certificate authority pem , certificate private key pem (which includes certificate and private key), and certificate private key password if dynamic vlan and mac filtering are to be activated, the box(es) should be checked (see section docid\ pbixysq njonqbhqc2s g ) vlans can be dynamically assigned by a radius server to applicants requesting 802 1x authentication through that server if dynamic vlan is assigned to applicants, the following 2 settings must be set in single connect check the dynamic vlan box in the 802 1x config screen the radius attribute policy should be defined on the related user group as vlan interval see section docid\ viyj4ncxaug0egtxhk432 check the add single connect server to active directory box and fill in the required fields