222
C
HAPTER
17: 802.1
X
C
ONFIGURATION
■
Users belonging to the Guest VLAN can access the resources of the Guest
VLAN without being authenticated. But they need to be authenticated when
accessing external resources.
Normally, the Guest VLAN function is coupled with the dynamic VLAN delivery
function.
Refer to “Introduction to AAA” on page 237
for detailed information about the
dynamic VLAN delivery function.
Enabling 802.1x Re-authentication
802.1x re-authentication is timer-triggered or packet-triggered. It re-authenticates
users who have passed authentication. With 802.1x re-authentication enabled,
the switch can monitor the connection status of users periodically. If the switch
receives no re-authentication response from a user in a period of time, it tears
down the connection to the user. To connect to the switch again, the user needs
to initiate 802.1x authentication with the client software again.
Figure 74
802.1x re-authentication
802.1x re-authentication can be enabled in one of the following two ways:
■
The RADIUS server triggers the switch to perform 802.1x user
re-authentication. The RADIUS server sends the switch an Access-Accept
packet with the Termination-Action field of 1. Upon receiving the packet, the
switch re-authenticates users periodically.
■
You enable 802.1x re-authentication on the switch. With 802.1x
re-authentication enabled, the switch re-authenticates users periodically.
n
802.1x re-authentication fails if a CAMS server is configured to perform
authentication but not accounting because a CAMS server establishes a user
session after it begins to perform accounting. Therefore, to enable 802.1x
re-authentication, do not configure the accounting none command in the domain.
This restriction does not apply to other types of servers.
PC
Internet
PC
PC
RADIUS
Server
Switch
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...