77
Authentication status
VLAN manipulation
A user in the 802.1X critical VLAN fails
authentication because all the RADIUS
servers are unreachable.
The user is still in the critical VLAN.
A user in the critical VLAN fails 802.1X
authentication for any other reason than
server unreachable.
If an Auth-Fail VLAN has been configured, re-maps the MAC
address of the user to the Auth-Fail VLAN ID.
A user in the critical VLAN passes 802.1X
authentication.
Re-maps the MAC address of the user to the server-assigned
VLAN.
If the authentication server assigns no VLAN, re-maps the MAC
address of the user to the default or user-configured PVID on the
port.
A user in the 802.1X guest VLAN or the
Auth-Fail VLAN fails authentication because
all the RADIUS server are unreachable.
The user remains in the 802.1X VLAN or the Auth-Fail VLAN.
A user in the MAC authentication guest
VLAN fails 802.1X authentication because
all the 802.1X authentication server are
unreachable.
The user is removed from the MAC authentication VLAN and
mapped to the 802.1X critical VLAN.
NOTE:
The network device assigns a hybrid port to an 802.1X critical VLAN as an untagged member.
Any of the following RADIUS authentication server changes in the ISP domain for 802.1X users on a port
can cause the users to be removed from the critical VLAN:
•
An authentication server is added to the ISP domain and the server is reachable.
•
A response from a RADIUS authentication server is received.
•
The RADIUS server probing function detects that a RADIUS authentication server is reachable.
You can use the
dot1x critical recovery-action reinitialize
command to configure the port to trigger
802.1X re-authentication when the port or an 802.1X user on the port is removed from the critical VLAN.
•
If MAC-based access control is used, the port sends a unicast Identity EAP/Request to the 802.1X
user to trigger authentication.
•
If port-based access control is used, the port sends a multicast Identity EAP/Request to the 802.1X
users to trigger authentication.
ACL assignment
You can specify an ACL for an 802.1X user to control its access to network resources. After the user
passes 802.1X authentication, the authentication server, either the local access device or a RADIUS
server, assigns the ACL to the port to filter the traffic from this user. In either case, you must configure the
ACL on the access device. You can change ACL rules while the user is online.
Configuration prerequisites
•
Configure an ISP domain and AAA scheme (local or RADIUS authentication) for 802.1X users.