396
C
HAPTER
21: 802.1
X
C
ONFIGURATION
The EAP-TLS mode authenticates supplicant systems by authenticating licenses of
both authentication servers and supplicant systems on both sides. In this mode,
supplicant systems are authenticated by their licenses only, which are applied for from
authentication servers. User name and password are not needed. Before the course of
authentication, a supplicant system and the authentication server negotiate with each
other by invoking TLS mechanism to obtain the way to encrypt session and then verify
the licenses of each other in the way just negotiated.
EAP-TTLS is an extension of EAP-TLS. It extends the two-way authentication of
supplicant system and authentication server implemented in EAP-TLS and uses
security channels created by TLS to transport information.
In EAP-TTLS, the authentication procedure includes two steps:
1
The supplicant system authenticates the server by verifying the license of the server,
and creates an encrypted TLS channel in EAP-TTLS mode.
2
The supplicant system is authenticated by way of the created TLS channel in the way
negotiated by the supplicant system and the authentication server. The supplicant
system transmits its authentication information transparently through the TLS channel
to the TTLS server, which in turn extracts the authentication information and delivers
it to the AAA server to accomplish the authentication.
As the four authentication modes, that is, PEAP, EAP-TLS, EAP-TTLS, and EAP-MD5,
are all EAP authentication mode for a switch, you can perform the operations listed in
Table 419 to specify any one of the four authentication modes. The actual
authentication mode adopted depends on the authentication mode configured on
the supplicant system.
Configuring 802.1x EAP Authentication
802.1x PEAP Configuration Example
Network requirements
■
A supplicant system is connected to Ethernet1/0/1 port of a switch.
■
Control the accesses to the Internet by authenticating supplicant systems on each
port of the switch using PEAP. The ports operate in MAC address-based
authentication mode.
Table 419
Configure 802.1x EAP authentication
Operation
Command
Description
Enter system view
system-view
Configure to
authenticate supplicant
systems by using EAP
dot1x
authentication-method
eap
Required
By default, supplicant systems are
authenticated by using CHAP (challenge
handshake authentication protocol).
Enter Ethernet port
view (supplicant system
side)
interface
interface-type
interface-number
Configure the port to
operate in MAC
address-based
authentication mode
dot1x port-method
macbased
Optional
By default, an Ethernet port operates in
MAC address-based authentication mode.
When using EAP to authenticate supplicant
systems, make sure the related ports
operate in MAC address-based
authentication mode.
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...