123
e.
Configure the switch to not include domain names in the usernames sent to the RADIUS
server.
3.
Configure an ISP domain on the switch:
a.
From the navigation tree, select
Security
>
Authentication
>
ISP Domains
.
b.
Add ISP domain
dm1X
, and set the domain state to
Active
.
c.
Set the access service to LAN access.
d.
Configure the ISP domain to use RADIUS scheme
802.1X
for authentication, authorization,
and accounting of LAN users.
4.
Configure 802.1X on the switch:
a.
From the navigation tree, select
Security
>
Access Control
>
802.1X
.
b.
Enable 802.1X globally.
c.
Enable 802.1X on GigabitEthernet 1/0/1, and set the access control method to MAC-based.
d.
On the advanced settings page for GigabitEthernet 1/0/1, set the port authorization state to
Auto
and set the mandatory ISP domain to
dm1X
.
5.
Configure the RADIUS server:
a.
# Add a user account on the server. (Details not shown.)
b.
# Configure the authentication, authorization, and accounting settings. (Details not shown.)
Verifying the configuration
1.
From the navigation tree, select
Security
>
Authentication
>
RADIUS
.
2.
Verify the configuration of RADIUS scheme
802.1X
. (Details not shown.)
3.
From the navigation tree, select
Security
>
Authentication
>
ISP Domains
.
4.
Verify the configuration of ISP domain
dm1X
. (Details not shown.)
5.
Use the configured user account to pass authentication.
6.
From the navigation tree, select
Security
>
Access Control
>
802.1X
.
7.
Verify that the number of online users is not
0
on GigabitEthernet 1/0/1. (Details not shown.)
802.1X local authentication configuration example
Network requirements
As shown in
, add a user account with username
dotuser
and password
12345
on the
switch. Configure the switch to meet the following requirements:
•
Perform local 802.1X authentication to control the network access of users on GigabitEthernet
1/0/1.
•
Authenticate the users in ISP domain
abc
.
•
Specify port-based access control on GigabitEthernet 1/0/1. After a user passes authentication
on the port, all subsequent users can access the network without authentication.
Figure 42 Network diagram
Configuration procedure
1.
Configure IP addresses for the interfaces, as shown in
. (Details not shown.)
2.
Configure the local user account: