The IEEE-802.1X authentication provides a security standard for network access control with RADIUS servers and holds a network port disconnected until authentication is completed. With 802.1X authentication, the supplicant provides credentials, such as user name, password, or digital certificate to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network. The Switch uses 802.1X to enable or disable port access control, to enable or disable the Guest VLAN, and to enable or disable the forwarding EAPOL (Extensible Authentication Protocol over LANs) frames.
Additionally, we can also have the VLAN assignment done through the RADIUS server itself.
Please refer to Setting Up 802.1x Authentication On SonicWall Switch for 802.1X authentication related settings on the firewall and RADIUS server.
EXAMPLE: Let us consider that the RADIUS server is connected to port 1 of the switch and has static IP: 192.168.181.100. The PC that needs be authenticated is connected to port 5 on the switch which is portshielded to interface X0. Once it is successfully authenticated we need to get an IP from X0:V190 subnet.
The X0 interface is on 192.168.181.0/24 network and has two VLAN sub-interfaces X0:V190 - 192.168.190.0/24 and X0:V195 - 192.168.195.0/24.

Navigate to MANAGE | Network | Interfaces to make sure that the VLAN sub-interfaces are set up correctly.

Please refer to How Can I Configure Sub-Interfaces? to add sub-interfaces on the firewall.
Enable 802.1X Authentication on Port 5


The following additional changes will be required on the NPS policy for VLAN assignment.




On the end machine that is connected to port 5, once the successful authentication is done, it gets an IP address from X0:V190 subnet.
You can see the following states on the Ethernet adapter of the end machine:

