EAPoL (EAP) uses RADIUS protocol for EAP-authorized logons. RADIUS supports IPv4 and IPv6 addresses with no difference in functionality or configuration in all but the following case. When adding a RADIUS server in Enterprise Device Manager (EDM) or modifying a RADIUS configuration in EDM, you must specify if the address type is an IPv4 or an IPv6 address.
Before configuring your device, you must configure at least one EAP RADIUS server and shared secret fields.
You cannot configure EAP on ports that are currently configured for:
Shared segments
MultiLink Trunking (MLT)
Change the status of each port that you want to be controlled to auto. For more information on changing the status, see Configure EAP on a Port. The auto setting automatically authenticates the port according to the results of the RADIUS server. The default authentication setting for each port is force-authorized.
You can connect only a single client on each port configured for EAP. If you attempt to add additional clients on the EAP authorized port, the client traffic will be blocked from the switch till mac-ageing occurs for that client.