Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Example: Setting Up 802.1X in Conference Rooms to Provide Internet Access to Corporate Visitors on an EX Series Switch

802.1X on EX Series switches provides LAN access to users who do not have credentials in the RADIUS database. These users, referred to as guests, are authenticated and typically provided with access to the Internet.

This example describes how to create a guest VLAN and configure 802.1X authentication for it.


This example uses the following software and hardware components:


This example also applies to QFX5100 switches.

  • Junos OS Release 9.0 or later for EX Series switches

  • One EX Series switch acting as a port access entity (PAE). The interfaces on the authenticator PAE form a control gate that blocks all traffic to and from supplicants until they are authenticated.

  • One RADIUS authentication server that supports 802.1X. The authentication server acts as the backend database and contains credential information for hosts (supplicants) that have permission to connect to the network.

Before you configure guest VLAN authentication, be sure you have:

Overview and Topology

As part of IEEE 802.1X port-based network access control (PNAC), you can provide limited network access to supplicants who do not belong to a VLAN authentication group by configuring authentication for a guest VLAN. Typically, guest VLAN access is used to provide Internet access to visitors to a corporate site. However, you can also use the guest VLAN feature to provide access to a VLAN with limited resources to supplicants that fail 802.1X authentication on a corporate LAN.


This figure also applies to QFX5100 switches.


Figure 1 shows the conference room connected to the switch at interface ge-0/0/1.

Figure 1: Topology for Guest VLAN ExampleTopology for Guest VLAN Example
Table 1: Components of the Guest VLAN Topology
Property Settings

Switch hardware

EX4200 switch, 24 Gigabit Ethernet interfaces: 8 PoE interfaces (ge-0/0/0 through ge-0/0/7) and 16 non-PoE interfaces (ge-0/0/8 through ge-0/0/23)

VLAN names and tag IDs

sales, tag 100support, tag 200

guest-vlan, tag 300

One RADIUS server

Backend database connected to the switch through interface ge-0/0/10

In this example, access interface ge-0/0/1 provides LAN connectivity in the conference room. Configure this access interface to provide LAN connectivity to visitors in the conference room who are not authenticated by the corporate VLAN.

Configuration of a Guest VLAN That Includes 802.1X Authentication


CLI Quick Configuration

To quickly configure a guest VLAN, with 802.1X authentication, copy the following commands and paste them into the switch terminal window:

Step-by-Step Procedure

To configure a guest VLAN that includes 802.1X authentication on an EX Series switch:

  1. Configure the VLAN ID for the guest VLAN:

  2. Configure the guest VLAN under dot1x protocol:


Check the results of the configuration:


To confirm that the configuration is working properly, perform these tasks:

Verifying That the Guest VLAN Is Configured


Verify that the guest VLAN is created and that an interface has failed authentication and been moved to the guest VLAN.


On switches running Junos OS for EX Series with support for ELS, the output for the show vlans command will contain additional information. If your switch runs software that supports ELS, see show vlans. For ELS details, see Using the Enhanced Layer 2 Software CLI.


Issue the operational mode commands:


The output of the show vlans command shows guest-vlan as the name of the VLAN and the VLAN ID as 300.

The output of the show dot1x interface ge-0/0/1.0 detail command displays the Guest VLAN membership field, indicating that a supplicant at this interface failed 802.1X authentication and was passed through to the guest-vlan.