8-33
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-03
Chapter 8 Configuring IEEE 802.1x Port-Based Authentication
Configuring IEEE 802.1x Authentication
Use the
show radius statistics
privileged EXEC command to display the number of RADIUS messages
that do not receive the accounting response message.
This example shows how to configure IEEE 802.1x accounting. The first command configures the
RADIUS server, specifying 1813 as the UDP port for accounting:
Switch(config)#
radius-server host 172.120.39.46 auth-port 1812 acct-port 1813 key rad123
Switch(config)#
aaa accounting dot1x default start-stop group radius
Switch(config)#
aaa accounting system default start-stop group radius
Configuring a Guest VLAN
When you configure a guest VLAN, clients that are not IEEE 802.1x-capable are put into the guest
VLAN when the server does not receive a response to its EAP request/identity frame. Clients that are
IEEE 802.1x-capable but that fail authentication are not granted network access. The switch supports
guest VLANs in single-host or multiple-hosts mode.
Beginning in privileged EXEC mode, follow these steps to configure a guest VLAN. This procedure is
optional.
To disable and remove the guest VLAN, use the
no dot1x guest-vlan
interface configuration command.
The port returns to the unauthorized state.
Step 5
end
Return to privileged EXEc mode.
Step 6
show running-config
Verify your entries.
Step 7
copy running-config startup-config
(Optional) Saves your entries in the configuration file.
Command
Purpose
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
interface
interface-id
Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the
“IEEE 802.1x Authentication
Configuration Guidelines” section on page 8-21
.
Step 3
switchport mode access
or
switchport mode private-vlan host
Set the port to access mode,
or
Configure the Layer 2 port as a private-VLAN host port.
Step 4
dot1x port-control auto
Enable IEEE 802.1x authentication on the port.
Step 5
dot1x guest-vlan
vlan-id
Specify an active VLAN as an IEEE 802.1x guest VLAN. The range is 1
to 4094.
You can configure any active VLAN except an internal VLAN (routed
port), an RSPAN VLAN, a primary private VLAN, or a voice VLAN as
an IEEE 802.1x guest VLAN.
Step 6
end
Return to privileged EXEC mode.
Step 7
show dot1x interface
interface-id
Verify your entries.
Step 8
copy running-config startup-config
(Optional) Save your entries in the configuration file.