C H A P T E R
40-1
Catalyst 6500 Series Switch Software Configuration Guide—Release 8.7
OL-8978-04
40
Configuring 802.1X Authentication
This chapter describes how to configure IEEE 802.1X authentication on the Catalyst 6500 series
switches.
Note
For complete syntax and usage information for the commands that are used in this chapter, refer to the
Catalyst 6500 Series Switch Command Reference
publication.
Note
For information on configuring MAC address authentication bypass, see
Chapter 41, “Configuring MAC
Authentication Bypass.”
Note
For information on using port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet
port when the MAC address of the station attempting to access the port is different from any of the MAC
addresses that are specified for that port, see
Chapter 38, “Configuring Port Security.”
That chapter also
provides information on using port security to filter the traffic that is destined to or received from a
specific host that is based on the host MAC address.
Note
For information on configuring authentication, authorization, and accounting (AAA) to monitor and
control access to the command-line interface (CLI) on the Catalyst 6500 series switches, see
Chapter 39,
“Configuring the Switch Access Using AAA.”
Note
For information on configuring Network Admission Control, see
Chapter 44, “Configuring Network
Admission Control.”
Note
For information on configuring network admission control, see
Chapter 44, “Configuring Network
Admission Control.”
This chapter consists of these sections:
•
Understanding How 802.1X Authentication Works, page 40-2
•
Default Authentication Configuration, page 40-11
•
Authentication Configuration Guidelines, page 40-12