Perform the following steps:
- Click the Use 802.1X Security checkbox to enable this feature.
- Click the Authentication dropdown list and click on the required method (TLS, Tunneled TLS, or Protected EAP).
- Click in the Identity field, and enter the identity associated with the client certificate.
“Identity” is indicated during certificate creation. Coordinate with the network administrator who provided the certificate
for this value.
- Click on the User Certificate dropdown and click to select the client certificate that you previously imported.
- Click on the CA Certificate dropdown and click to select the CA certificate that you previously imported.
- Click Save.
NOTE: On saving your changes a device reboot is required. This is because the 802.1X connection is established during booting. If
the device is unable to authenticate to the 802.1X port on the network, the connection will fail.
Once the reboot completes, open the IEEE 802.1X Configuration view to confirm that the device Status is “Authorized”, which tells you that the supplicant device is correctly configured
and connected on the primary adapter with 802.1X.
NOTE: If the device is configured with the wrong certificates, wrong credentials, or a scheme that is not supported, the connection
will fail and you will see Status is “Unauthorized”.
Once the supplicant device is successfully connected on the network, it behaves the same as any other device on a non-protected
network.