858
802.1x Commands
Whenever an operator configures a port in Dot1x authentication mode and
selects the authentication method as internal, then the user credentials
received from the Dot1x supplicant is validated against the IDAS by Dot1x
component. The Dot1x application accesses the Dot1x user database to
check whether the user credentials present in the authentication message
corresponds to a valid user or not. If so then an event is generated which
triggers the Dot1x state machine to send a challenge to the supplicant.
Otherwise a failure is returned to the Dot1x state machine and the user is not
granted access to the port.
If user(s) credentials are changed, the existing user connection(s) are not
disturbed and the changed user(s) credentials are only used when a new EAP
request arises.
A CLI configuration mode is added in order to configure dot1x users and
their attributes. The Dot1x maintained user database can be exported
(uploaded) or imported (downloaded) to/from a central location using a
TFTP server.
MAC Authentication Bypass
Today, 802.1x has become the recommended port-based authentication
method at the access layer in enterprise networks. However, there may be
802.1x unaware devices such as printers, fax-machines etc that would require
access to the network without 802.1x authentication. MAC Authentication
Bypass (MAB) is a supplemental authentication mechanism to allow 802.1x
unaware clients to authenticate to the network. It uses the 802,1x
infrastructure and MAB cannot be supported independent of the Dot1x
component.
MAC Authentication Bypass (MAB) provides 802.1x unaware clients
controlled access to the network using the devices’ MAC address as an
identifier. This requires that the known and allowable MAC address and
corresponding access rights be pre-populated in the authentication server.
MAB only works when the port control mode of the port is MAC-based.
Port access by MAB clients is allowed if the Dot1x user database has
corresponding entries added for the MAB clients with user name and
password attributes set to the MAC address of MAB clients.
2CSPC4.X7000-SWUM204.book Page 858 Friday, March 15, 2013 8:22 AM
Summary of Contents for Networking 7048
Page 76: ...Contents 76 ...
Page 168: ...Command Groups 168 ...
Page 242: ...Using the CLI 242 ...
Page 244: ...244 Layer 2 Switching Commands ...
Page 278: ...278 AAA Commands ...
Page 287: ...Administrative Profiles Commands 287 global config ethernet config port channel config ...
Page 288: ...288 Administrative Profiles Commands ...
Page 326: ...326 Address Table Commands Maximum addresses 100 Learned addresses ...
Page 332: ...332 Auto VoIP Commands ...
Page 366: ...366 DHCP Management Interface Commands ...
Page 464: ...464 Ethernet CFM Commands ...
Page 478: ...478 Green Ethernet Commands ...
Page 502: ...502 IGMP Snooping Commands ...
Page 542: ...542 IPv6 Access List Commands ...
Page 554: ...554 IPv6 MLD Snooping Commands ...
Page 568: ...568 IP Source Guard Commands ...
Page 580: ...580 iSCSI Optimization Commands ...
Page 588: ...588 Link Dependency Commands ...
Page 616: ...616 LLDP Commands ...
Page 652: ...652 Port Channel Commands ...
Page 752: ...752 RADIUS Commands ...
Page 784: ...784 Spanning Tree Commands ...
Page 850: ...850 VLAN Commands ...
Page 856: ...856 Voice VLAN Commands ...
Page 890: ...890 Layer 3 Commands ...
Page 934: ...934 DHCP Server and Relay Agent Commands ...
Page 960: ...960 DVMRP Commands ...
Page 980: ...980 IGMP Commands ...
Page 988: ...988 IGMP Proxy Commands ...
Page 1036: ...1036 IP Routing Commands ...
Page 1109: ...IPv6 Routing Commands 1109 Tracing route over a maximum of 20 hops 1 N N N ...
Page 1110: ...1110 IPv6 Routing Commands ...
Page 1114: ...1114 Loopback Interface Commands ...
Page 1144: ...1144 Multicast Commands ...
Page 1296: ...1296 OSPFv3 Commands ...
Page 1306: ...1306 Router Discovery Protocol Commands ...
Page 1322: ...1322 Routing Information Protocol Commands console config router split horizon none ...
Page 1328: ...1328 Tunnel Interface Commands ...
Page 1354: ...1354 Utility Commands ...
Page 1364: ...1364 Auto Install Commands ...
Page 1406: ...1406 CLI Macro Commands ...
Page 1424: ...1424 Clock Commands ...
Page 1430: ...1430 Command Line Configuration Scripting Commands ...
Page 1451: ...Configuration and Image File Commands 1451 console ...
Page 1452: ...1452 Configuration and Image File Commands ...
Page 1482: ...1482 Mode Commands ...
Page 1518: ...1518 Power Over Ethernet Commands ...
Page 1576: ...1576 Sflow Commands ...
Page 1604: ...1604 SNMP Commands ...
Page 1618: ...1618 SSH Commands ...
Page 1640: ...1640 Syslog Commands ...
Page 1708: ...1708 System Management Commands 5 ...
Page 1716: ...1716 Terminal Length Commands ...
Page 1786: ...1786 Appendix A List of Commands ...
Page 1787: ...www dell com support dell com Printed in the U S A ...
Page 1788: ......