C H A P T E R
46-1
Cisco 7600 Series Router Cisco IOS Software Configuration Guide, Release 12.2SX
OL-4266-08
46
Configuring IEEE 802.1X Port-Based Authentication
This chapter describes how to configure IEEE 802.1X port-based authentication to prevent unauthorized
devices (clients) from gaining access to the network.
Note
For complete syntax and usage information for the commands used in this chapter, refer to the
Cisco IOS
Master Command List
, Release 12.2SX at this URL:
http://www.cisco.com/en/US/docs/ios/mcl/122sxmcl/12_2sx_mcl_book.html
This chapter consists of these sections:
•
Understanding 802.1X Port-Based Authentication, page 46-1
•
Default 802.1X Port-Based Authentication Configuration, page 46-6
•
802.1X Port-Based Authentication Guidelines and Restrictions, page 46-6
•
Configuring 802.1X Port-Based Authentication, page 46-7
•
Displaying 802.1X Status, page 46-16
Tip
For additional information (including configuration examples and troubleshooting information), see the
documents listed on this page:
http://www.cisco.com/en/US/products/hw/routers/ps368/tsd_products_support_series_home.html
Understanding 802.1X Port-Based Authentication
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that
restricts unauthorized clients from connecting to a LAN through publicly accessible ports. The
authentication server authenticates each client connected to a router port and assigns the port to a VLAN
before making available any services offered by the router or the LAN.
Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol
over LAN (EAPOL) traffic through the port to which the client is connected. After authentication is
successful, normal traffic can pass through the port.