Configuring adapter settings

Once the required certificates are imported to the remote device’s Certificate Manager, you will use the Workbench IEEE 802.1X Configuration view to configure the 802.1X properties on the primary adapter for the device.

Perform the following steps:
  1. Click the Use 802.1X Security checkbox to enable this feature.
  2. Click the Authentication dropdown list and click on the required method (TLS, Tunneled TLS, or Protected EAP).
  3. Click in the Identity field, and enter the identity associated with the client certificate.
    “Identity” is indicated during certificate creation. Coordinate with the network administrator who provided the certificate for this value.
  4. Click on the User Certificate dropdown and click to select the client certificate that you previously imported.
  5. Click on the CA Certificate dropdown and click to select the CA certificate that you previously imported.
  6. Click Save.
     
    NOTE: On saving your changes a device reboot is required. This is because the 802.1X connection is established during booting. If the device is unable to authenticate to the 802.1X port on the network, the connection will fail.
     

    Once the reboot completes, open the IEEE 802.1X Configuration view to confirm that the device Status is “Authorized”, which tells you that the supplicant device is correctly configured and connected on the primary adapter with 802.1X.

    Image
     
    NOTE: If the device is configured with the wrong certificates, wrong credentials, or a scheme that is not supported, the connection will fail and you will see Status is “Unauthorized”.
     

Once the supplicant device is successfully connected on the network, it behaves the same as any other device on a non-protected network.