201
Configuring IEEE 802.1x Port-Based Authentication
Information About Configuring IEEE 802.1x Port-Based Authentication
Follow these guidelines to enable the readiness check on the switch:
The readiness check is typically used before 802.1x is enabled on the switch.
The 802.1x readiness check is allowed on all ports that can be configured for 802.1x. The readiness check is not
available on a port that is configured as
dot1x force-unauthorized
.
If you use the
dot1x test eapol-capable
privileged EXEC command without specifying an interface, all the ports on
the switch stack are tested.
When you configure the
dot1x test eapol-capable
command on an 802.1x-enabled port, and the link comes up,
the port queries the connected client about its 802.1x capability. When the client responds with a notification packet,
it is 802.1x-capable. A syslog message is generated if the client responds within the timeout period. If the client
does not respond to the query, the client is not 802.1x-capable. No syslog message is generated.
The readiness check can be sent on a port that handles multiple hosts (for example, a PC that is connected to an IP
phone). A syslog message is generated for each of the clients that respond to the readiness check within the timer
period.
For information on configuring the switch for the 802.1x readiness check, see
Configuring 802.1x Readiness Check,
802.1x Authentication with VLAN Assignment
The RADIUS server sends the VLAN assignment to configure the switch port. The RADIUS server database maintains the
username-to-VLAN mappings, assigning the VLAN based on the username of the client connected to the switch port.
You can use this feature to limit network access for certain users.
When a voice device is authorized and the RADIUS server returns an authorized VLAN, the voice VLAN on the port is
configured to send and receive packets on the assigned voice VLAN. Voice VLAN assignment behaves the same as data
VLAN assignment on multidomain authentication (MDA)-enabled ports. For more information, see
When configured on the switch and the RADIUS server, 802.1x authentication with VLAN assignment has these
characteristics:
If no VLAN is supplied by the RADIUS server or if 802.1x authentication is disabled, the port is configured in its
access VLAN after successful authentication. Recall that an access VLAN is a VLAN assigned to an access port. All
packets sent from or received on this port belong to this VLAN.
If 802.1x authentication is enabled but the VLAN information from the RADIUS server is not valid, authorization fails
and configured VLAN remains in use. This prevents ports from appearing unexpectedly in an inappropriate VLAN
because of a configuration error.
Configuration errors could include specifying a VLAN for a routed port, a malformed VLAN ID, a nonexistent or
internal (routed port) VLAN ID, an RSPAN VLAN, a shut down or suspended VLAN. In the case of a mutlidomain host
port, configuration errors can also be due to an attempted assignment of a data VLAN that matches the configured
or assigned voice VLAN ID (or the reverse).
If 802.1x authentication is enabled and all information from the RADIUS server is valid, the authorized device is
placed in the specified VLAN after authentication.
If the multiple-hosts mode is enabled on an 802.1x port, all hosts are placed in the same VLAN (specified by the
RADIUS server) as the first authenticated host.
Enabling port security does not impact the RADIUS server-assigned VLAN behavior.
If 802.1x authentication is disabled on the port, it is returned to the configured access VLAN and configured voice
VLAN.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...