21-9
Catalyst 6000 Family Software Configuration Guide—Releases 6.3 and 6.4
78-13315-02
Chapter 21 Configuring Switch Access Using AAA
Configuring Authentication
Traffic Control
You can restrict traffic in both directions or just incoming traffic.
Authentication Server
The frames exchanged between the authenticator and the authentication server are dependent on the
authentication mechanism, so they are not defined by the 802.1x standard. You can use other protocols,
but we recommend RADIUS for authentication, particularly when the authentication server is located
remotely, because RADIUS has extensions that support encapsulation of EAP frames built into it.
802.1x Parameters Configurable on the Switch
You can configure these 802.1x parameters on the switch:
•
Force-Authorized, Force-Unauthorized, or Automatic 802.1x port control
•
Enable or disable multiple hosts on a specific port
•
Enable or disable system authentication control
•
Specify quiet time interval
•
Specify the authenticator to supplicant retransmission time interval
•
Specify the back-end authenticator to supplicant retransmission time interval
•
Specify the back-end authenticator to authentication server retransmission time interval
•
Specify the number of frames retransmitted from the back-end authenticator to supplicant
•
Specify the automatic supplicant reauthentication time interval
•
Enable or disable automatic supplicant reauthentication
Configuring Authentication
These sections describe how to configure the different authentication methods:
•
Authentication Default Configuration, page 21-10
•
Authentication Configuration Guidelines, page 21-11
•
Configuring Login Authentication, page 21-12
•
Configuring Local Authentication, page 21-13
•
Configuring Authentication, page 21-17
•
Configuring RADIUS Authentication, page 21-23
•
Configuring Kerberos Authentication, page 21-31
•
Configuring 802.1x Authentication, page 21-40
•
Authentication Example, page 21-48