![Dell Force10 S4810P Reference Manual Download Page 1433](http://html.mh-extra.com/html/dell/force10-s4810p/force10-s4810p_reference-manual_860041433.webp)
Port Authentication (802.1X) Commands
An authentication server must authenticate a client connected to an 802.1X switch port. Until the authentication, only
Extensible Authentication Protocol over LAN ( EAPOL) traffic is allowed through the port to which a client is connected.
After authentication is successful, normal traffic passes through the port.
FTOS supports RADIUS and Active Directory environments using 802.1X Port Authentication.
Important Points to Remember
FTOS limits network access for certain users by using VLAN assignments. 802.1X with VLAN assignment has these
characteristics when configured on the switch and the RADIUS server.
•
802.1X is supported on C-Series, E-Series, S-Series, Z-Series, and S4810.
•
802.1X is not supported on the LAG or the channel members of a LAG.
•
If no VLAN is supplied by the RADIUS server or if 802.1X authorization is disabled, the port is configured in its
access VLAN after successful authentication.
•
If 802.1X authorization is enabled but the VLAN information from the RADIUS server is not valid, the port returns
to the Unauthorized state and remains in the configured access VLAN. This prevents ports from appearing
unexpectedly in an inappropriate VLAN due to a configuration error. Configuration errors create an entry in
Syslog.
•
If 802.1X authorization is enabled and all information from the RADIUS server is valid, the port is placed in the
specified VLAN after authentication.
•
If port security is enabled on an 802.1X port with VLAN assignment, the port is placed in the RADIUS server
assigned VLAN.
•
If 802.1X is disabled on the port, it is returned to the configured access VLAN.
•
When the port is in the Force Authorized, Force Unauthorized, or Shutdown state, it is placed in the configured
access VLAN.
•
If an 802.1X port is authenticated and put in the RADIUS server assigned VLAN, any change to the port access
VLAN configuration does not take effect.
•
The 802.1X with VLAN assignment feature is not supported on trunk ports, dynamic ports, or with dynamic-
access port assignment through a VLAN membership.
dot1x authentication (Configuration)
Enable dot1x globally; dot1x must be enabled both globally and at the interface level.
C-Series, E-Series, S-Series, Z-Series, S4810
Syntax
dot1x authentication
To disable dot1x on an globally, use the
no dot1x authentication
command.
Defaults
Disabled.
Command Modes
CONFIGURATION
Command History
Version 8.3.11.1
Introduced on the Z9000.
Version 8.3.7.0
Introduced on the S4810.
Version 7.6.1.0
Introduced on the C-Series and S-Series.
Version 7.4.1.0
Introduced on the E-Series.
1433
Summary of Contents for Force10 S4810P
Page 1: ...FTOS Command Line Reference Guide for the S4810 System FTOS 9 1 0 0 ...
Page 48: ...48 ...
Page 62: ...62 ...
Page 92: ...92 ...
Page 102: ...102 ...
Page 202: ...202 ...
Page 216: ...216 ...
Page 334: ...334 ...
Page 564: ...564 ...
Page 570: ...570 ...
Page 594: ...594 ...
Page 632: ...632 ...
Page 642: ...642 ...
Page 662: ...662 ...
Page 670: ...Related Commands clear ip dhcp snooping clears the contents of the DHCP binding table 670 ...
Page 688: ...688 ...
Page 702: ...702 ...
Page 712: ...712 ...
Page 723: ...Related Commands show gvrp displays the GVRP configuration 723 ...
Page 724: ...724 ...
Page 736: ...736 ...
Page 900: ...900 ...
Page 934: ...934 ...
Page 958: ...958 ...
Page 966: ...966 ...
Page 1018: ...1018 ...
Page 1026: ...1026 ...
Page 1086: ...1086 ...
Page 1100: ...1100 ...
Page 1116: ...1116 ...
Page 1164: ...1164 ...
Page 1268: ...1268 ...
Page 1276: ...1276 ...
Page 1286: ...1286 ...
Page 1300: ...1300 ...
Page 1376: ...1376 ...
Page 1390: ...1390 ...
Page 1460: ...1460 ...
Page 1512: ...1512 ...
Page 1518: ...1518 ...
Page 1528: ...1528 ...
Page 1538: ...1538 ...
Page 1552: ...1552 ...
Page 1572: ...1572 ...
Page 1612: ...1612 ...