802.1x and RADIUS server authentication
U
SER
G
UIDE
138
It is possible to activate the Supplicant 802.1X functionalities on a port, confining the router to a
client role. To do so use:
set eth2 dot1x supplicant
if you want to specify the credentials to be used to request the authentication, use:
set dot1x supplicant-login mylogin password mypasswd
The command
show supplicant status
shows the port status, like:
root@IMOLA-TLC> show supplicant status
DOT1X Supplicant is active on interface(s): eth5
Port Address Supplicant PAE Port-Status EAP-State
---- ----------------- -------------- ------------- ---------
eth5 00:0d:5a:ce:fa:8d
AUTHENTICATED Authorized SUCCESS
If you use the RADIUS server of the router, you must configure the valid users list and the relative
VLAN-IDs if present. To do that, use:
set radius-server add-user gmg password gmg vlan-id 10 20 30 113 500
set radius-server add-user vll password vll vlan-id 10
set radius-server on
to the
gmg
user are associated the VLAN IDs
10
,
20
,
30
,
113
and
500
, while to the user
vll
is
associated the VLAN ID
10
If the authentication is successful, the VLANs that were dynamically created are automatically
associated to the user that requested the authentication.
For example, if a terminal connected on the
eth2
port request the authentication
DOT1X
and
specify
gmg
as user, after the correct authentication, the VLANs
eth2.10
,
eth2.20
,
eth2.30
and
eth2.113
will be created.
If the authentication is requested with a
vll
user
,
it will be created only the VLAN
eth2.10
.
The VLANS are created in Trunk mode.
If the RADIUS configuration expect a user to which is associated only one VLAN id, another user is
implicitly defined, and the name will have "
-acc
" suffix. Example: with a
vll
user, there will be a
vll-acc
user also.
If the router requests the authentication specifying the user name
vll-acc
, the relative VLAN will
be created in Access mode.