10-19
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-08
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
To configure per-user ACLs, you need to perform these tasks:
•
Enable AAA authentication.
•
Enable AAA authorization by using the
network
keyword to allow interface configuration from the
RADIUS server.
•
Enable 802.1x authentication.
•
Configure the user profile and VSAs on the RADIUS server.
•
Configure the 802.1x port for single-host mode.
Note
Per-user ACLs are supported only in single-host mode.
802.1x Authentication with Downloadable ACLs and Redirect URLs
You can download ACLs and redirect URLs from a RADIUS server to the switch during 802.1x
authentication or MAC authentication bypass of the host. You can also download ACLs during web
authentication.
Note
A downloadable ACL is also referred to as a
dACL
.
If more than one host is authenticated and the host mode is in single-host, MDA, or
multiple-authentication mode, the switch modifies the source address of the ACL to be the host IP
address.
You can apply the ACLs and redirect URLs to all the devices connected to the 802.1x-enabled port.
If no ACLs are downloaded during 802.1x authentication, the switch applies the static default ACL on
the port to the host. On a voice VLAN port, the switch applies the ACL only to the phone.
Beginning with Cisco IOS Release 12.2(55)SE, if you do not configure a static ACL on a port, a dynamic
Auth-Default-ACL is created and its policies are enforced. The Auth-Default-ACL is not stored in
NVRAM and cannot be retrieved by the nonvolatile generation (NVGEN) process. The
Auth-Default-ACL is removed from the port when the last authenticated session is terminated. You can
configure the Auth-Default-ACL by using the
ip access-list extended
auth-default-acl
global
configuration command.
You can control access for hosts with no authorization policy by using either the authz-directive on the
AAA server or the
epm access-control
open
global configuration
command on the switch. When the
open
directive is configured, all traffic is allowed. The
default
directive subjects traffic to the access
provided by the port.
Note
The default directive is
default
.
The 802.1x and MAB authentication methods support two modes: open and closed. In either mode, the
Auth-Default-ACL is created when you do not configure a static ACL on a port. For closed
authentication mode, when the first host authenticates, the authorization policy is applied without IP
address insertion. The policy is refreshed when a subsequent host is detected on the port.
When you do not configure a static ACL on the port, either the
open
or
default
directive allows all traffic.
When you configure a static ACL, the
default
directive applies that ACL to traffic that has no user
profile.
Содержание Catalyst 3750-E Series
Страница 48: ...Contents xlviii Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 ...
Страница 52: ...lii Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 Preface ...
Страница 1414: ...Index IN 58 Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 ...