122
3.
Repeat step 1 and 2 on Device B to verify that the static IPv4 source guard entries are
configured successfully.
802.1X RADIUS authentication configuration example
Network requirements
As shown in
, configure the switch to meet the following requirements:
•
Use the RADIUS server to perform authentication, authorization, and accounting for 802.1X
users.
•
Authenticate all 802.1X users who access the switch through GigabitEthernet 1/0/1 in ISP
domain
dm1X
.
•
Use MAC-based access control on GigabitEthernet 1/0/1 to authenticate all 802.1X users on
the port separately.
•
Exclude domain names from the usernames sent to the RADIUS server.
•
Use
name
as the authentication and accounting shared keys for secure RADIUS
communication between the switch and the RADIUS server.
•
Use ports
1812
and
1813
for authentication and accounting, respectively.
Figure 41 Network diagram
Configuration procedure
1.
Configure IP addresses for the interfaces, as shown in
Figure 38
. (Details not shown.)
2.
Configure a RADIUS scheme on the switch:
a.
From the navigation tree, select
Security
>
Authentication
>
RADIUS
.
b.
Add RADIUS scheme
802.1X
.
c.
Configure the primary authentication server:
−
Set the IP address to
10.1.1.1
.
−
Set the authentication port number to
1812
.
−
Set the shared key to
name
.
−
Set the server state to
Active
.
d.
Configure the primary accounting server:
−
Set the IP address to
10.1.1.1
.
−
Set the accounting port number to
1813
.
−
Set the shared key to
name
.
−
Set the server state to
Active
.