9-49
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
Chapter 9 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
This example shows how to configure 802.1x accounting. The first command configures the RADIUS
server, specifying 1813 as the UDP port for accounting:
Switch(config)#
radius-server host 172.120.39.46 auth-port 1812 acct-port 1813 key rad123
Switch(config)#
aaa accounting dot1x default start-stop group radius
Switch(config)#
aaa accounting system default start-stop group radius
Configuring a Guest VLAN
When you configure a guest VLAN, clients that are not 802.1x-capable are put into the guest VLAN
when the server does not receive a response to its EAP request/identity frame. Clients that are
802.1x-capable but that fail authentication are not granted network access. The switch supports guest
VLANs in single-host or multiple-hosts mode.
Beginning in privileged EXEC mode, follow these steps to configure a guest VLAN. This procedure is
optional.
To disable and remove the guest VLAN, use the
no dot1x guest-vlan
interface configuration command.
The port returns to the unauthorized state.
This example shows how to enable VLAN 2 as an 802.1x guest VLAN:
Switch(config)#
interface gigabitethernet2/0/2
Switch(config-if)#
dot1x guest-vlan 2
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
interface
interface-id
Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the
Configuration Guidelines” section on page 9-34
.
Step 3
switchport mode access
or
switchport mode private-vlan host
Set the port to access mode,
or
Configure the Layer 2 port as a private-VLAN host port.
Step 4
dot1x port-control auto
Enable 802.1x authentication on the port.
Step 5
dot1x guest-vlan
vlan-id
Specify an active VLAN as an 802.1x guest VLAN. The range is 1 to
4094.
You can configure any active VLAN except an internal VLAN (routed
port), an RSPAN VLAN, a primary private VLAN, or a voice VLAN as
an 802.1x guest VLAN.
Step 6
end
Return to privileged EXEC mode.
Step 7
show authentication
interface-id
or
show dot1x interface
interface-id
Verify your entries.
Step 8
copy running-config startup-config
(Optional) Save your entries in the configuration file.