210
Configuring IEEE 802.1x Port-Based Authentication
Information About Configuring IEEE 802.1x Port-Based Authentication
802.1x Authentication with MAC Authentication Bypass
You can configure the switch to authorize clients based on the client MAC address (see
) by using
the MAC authentication bypass feature. For example, you can enable this feature on 802.1x ports connected to devices
such as printers.
If 802.1x authentication times out while waiting for an EAPOL response from the client, the switch tries to authorize the
client by using MAC authentication bypass.
When the MAC authentication bypass feature is enabled on an 802.1x port, the switch uses the MAC address as the
client identity. The authentication server has a database of client MAC addresses that are allowed network access. After
detecting a client on an 802.1x port, the switch waits for an Ethernet packet from the client. The switch sends the
authentication server a RADIUS-access/request frame with a username and password based on the MAC address. If
authorization succeeds, the switch grants the client access to the network. If authorization fails, the switch assigns the
port to the guest VLAN if one is configured.
If an EAPOL packet is detected on the interface during the lifetime of the link, the switch determines that the device
connected to that interface is an 802.1x-capable supplicant and uses 802.1x authentication (not MAC authentication
bypass) to authorize the interface. EAPOL history is cleared if the interface link status goes down.
If the switch already authorized a port by using MAC authentication bypass and detects an 802.1x supplicant, the switch
does not unauthorize the client connected to the port. When reauthentication occurs, the switch uses 802.1x
authentication as the preferred reauthentication process if the previous session ended because the Termination-Action
RADIUS attribute value is DEFAULT.
Clients that were authorized with MAC authentication bypass can be reauthenticated. The reauthentication process is the
same as that for clients that were authenticated with 802.1x. During reauthentication, the port remains in the previously
assigned VLAN. If reauthentication is successful, the switch keeps the port in the same VLAN. If reauthentication fails,
the switch assigns the port to the guest VLAN, if one is configured.
If reauthentication is based on the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS
attribute (Attribute [29]) and if the Termination-Action RADIUS attribute (Attribute [29]) action is
Initialize,
(the attribute
value is
DEFAULT
), the MAC authentication bypass session ends, and connectivity is lost during reauthentication. If MAC
authentication bypass is enabled and the 802.1x authentication times out, the switch uses the MAC authentication
bypass feature to initiate reauthorization. For more information about these AV pairs, see RFC 3580, “802.1X Remote
Authentication Dial In User Service (RADIUS) Usage Guidelines.”
MAC authentication bypass interacts with the features:
802.1x authentication—You can enable MAC authentication bypass only if 802.1x authentication is enabled on the
port.
Guest VLAN—If a client has an invalid MAC address identity, the switch assigns the client to a guest VLAN if one is
configured.
Restricted VLAN—This feature is not supported when the client connected to an 802.lx port is authenticated with
MAC authentication bypass.
Port security—See
802.1x Authentication with Port Security, page 209
Voice VLAN—See
802.1x Authentication with Voice VLAN Ports, page 209
VLAN Membership Policy Server (VMPS)—802.1x and VMPS are mutually exclusive.
Private VLAN—You can assign a client to a private VLAN.
Network admission control (NAC) Layer 2 IP validation—This feature takes effect after an 802.1x port is authenticated
with MAC authentication bypass, including hosts in the exception list.
Network Edge Access Topology (NEAT)—MAB and NEAT are mutually exclusive. You cannot enable MAB when NEAT
is enabled on an interface, and you cannot enable NEAT when MAB is enabled on an interface.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...