210
Configuring IEEE 802.1x Port-Based Authentication
Information About Configuring IEEE 802.1x Port-Based Authentication
802.1x Authentication with MAC Authentication Bypass
You can configure the switch to authorize clients based on the client MAC address (see
) by using
the MAC authentication bypass feature. For example, you can enable this feature on 802.1x ports connected to devices
such as printers.
If 802.1x authentication times out while waiting for an EAPOL response from the client, the switch tries to authorize the
client by using MAC authentication bypass.
When the MAC authentication bypass feature is enabled on an 802.1x port, the switch uses the MAC address as the
client identity. The authentication server has a database of client MAC addresses that are allowed network access. After
detecting a client on an 802.1x port, the switch waits for an Ethernet packet from the client. The switch sends the
authentication server a RADIUS-access/request frame with a username and password based on the MAC address. If
authorization succeeds, the switch grants the client access to the network. If authorization fails, the switch assigns the
port to the guest VLAN if one is configured.
If an EAPOL packet is detected on the interface during the lifetime of the link, the switch determines that the device
connected to that interface is an 802.1x-capable supplicant and uses 802.1x authentication (not MAC authentication
bypass) to authorize the interface. EAPOL history is cleared if the interface link status goes down.
If the switch already authorized a port by using MAC authentication bypass and detects an 802.1x supplicant, the switch
does not unauthorize the client connected to the port. When reauthentication occurs, the switch uses 802.1x
authentication as the preferred reauthentication process if the previous session ended because the Termination-Action
RADIUS attribute value is DEFAULT.
Clients that were authorized with MAC authentication bypass can be reauthenticated. The reauthentication process is the
same as that for clients that were authenticated with 802.1x. During reauthentication, the port remains in the previously
assigned VLAN. If reauthentication is successful, the switch keeps the port in the same VLAN. If reauthentication fails,
the switch assigns the port to the guest VLAN, if one is configured.
If reauthentication is based on the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS
attribute (Attribute [29]) and if the Termination-Action RADIUS attribute (Attribute [29]) action is
Initialize,
(the attribute
value is
DEFAULT
), the MAC authentication bypass session ends, and connectivity is lost during reauthentication. If MAC
authentication bypass is enabled and the 802.1x authentication times out, the switch uses the MAC authentication
bypass feature to initiate reauthorization. For more information about these AV pairs, see RFC 3580, “802.1X Remote
Authentication Dial In User Service (RADIUS) Usage Guidelines.”
MAC authentication bypass interacts with the features:
802.1x authentication—You can enable MAC authentication bypass only if 802.1x authentication is enabled on the
port.
Guest VLAN—If a client has an invalid MAC address identity, the switch assigns the client to a guest VLAN if one is
configured.
Restricted VLAN—This feature is not supported when the client connected to an 802.lx port is authenticated with
MAC authentication bypass.
Port security—See
802.1x Authentication with Port Security, page 209
Voice VLAN—See
802.1x Authentication with Voice VLAN Ports, page 209
VLAN Membership Policy Server (VMPS)—802.1x and VMPS are mutually exclusive.
Private VLAN—You can assign a client to a private VLAN.
Network admission control (NAC) Layer 2 IP validation—This feature takes effect after an 802.1x port is authenticated
with MAC authentication bypass, including hosts in the exception list.
Network Edge Access Topology (NEAT)—MAB and NEAT are mutually exclusive. You cannot enable MAB when NEAT
is enabled on an interface, and you cannot enable NEAT when MAB is enabled on an interface.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...