Configuring the Switch
3-102
3
Web
– Click Security, Web Authentication, Re-authentication.
Figure 3-60 Web Authentication Port Re-authentication
CLI
– This example forces the re-authentication of all hosts connected to port 1/5.
Network Access
(
MAC Address Authentication)
Some devices connected to switch ports may not be able to support 802.1X
authentication due to hardware or software limitations. This is often true for devices
such as network printers, IP phones, and some wireless access points. The switch
enables network access from these devices to be controlled by authenticating
device MAC addresses with a central RADIUS server.
Notes: 1.
RADIUS authentication must be activated and configured properly for the
MAC Address authentication feature to work properly. (See “RADIUS Client”
on page 4-105.)
2.
MAC authentication cannot be configured on trunk ports.
Command Usage
• Network Access authentication controls access to the network by authenticating
the MAC address of each host that attempts to connect to a switch port. Traffic
received from a specific MAC address is forwarded by the switch only if the source
MAC address is successfully authenticated by a central RADIUS server. While
authentication for a MAC address is in progress, all traffic is blocked until
authentication is completed. On successful authentication, the RADIUS server
may optionally assign VLAN settings for the switch port.
• When enabled on a port interface, the authentication process sends a Password
Authentication Protocol (PAP) request to a configured RADIUS server. The user
name and password are both equal to the MAC address being authenticated. On
the RADIUS server, PAP username and passwords must be configured in the MAC
address format XX-XX-XX-XX-XX-XX (all in upper case).
• Authenticated MAC addresses are stored as dynamic entries in the switch secure
MAC address table and are removed when the aging time expires. The maximum
number of secure MAC addresses supported for the switch system is 1024.
Console#web-auth re-authenticate interface ethernet 1/5
Console#
Summary of Contents for iES4024GP
Page 1: ...iES4028F 4028FP 4024GP ...
Page 4: ...iv This page is intentionally left blank ...
Page 10: ...x This page is intentionally left blank ...
Page 28: ...Contents xxviii This page is intentionally left blank ...
Page 32: ...Tables xxxii This page is intentionally left blank ...
Page 46: ...Introduction 1 10 1 This page is intentionally left blank ...
Page 336: ...Configuring the Switch 3 280 3 This page is intentionally left blank ...
Page 688: ...Command Line Interface 4 352 4 This page is intentionally left blank ...
Page 702: ...Glossary Glossary 8 This page is intentionally left blank ...
Page 710: ...Index 8 Index This page is intentionally left blank ...
Page 711: ...This page is intentionally left blank ...
Page 712: ...iES4028F 4028FP 4024GP ...