A SERVICE OF

logo

xii
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6
General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . 10-9
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 10-9
VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12
General Setup Procedure for 802.1X Access Control . . . . . . . . . . 10-14
Do These Steps Before You Configure 802.1X Operation . . . . . . . . 10-14
Overview: Configuring 802.1X Authentication on the Switch . . . . . 10-17
Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . 10-18
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 10-19
A. Enable the Selected Ports as Authenticators and Enable
the (Default) Port-Based Authentication . . . . . . . . . . . . . . . . . . 10-19
B. Specify User-Based Authentication or Return to Port-Based
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-20
Example: Configuring User-Based 802.1X Authentication . . . . 10-21
Example: Configuring Port-Based 802.1X Authentication . . . . 10-21
2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . . 10-21
3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . . . 10-24
4. Enter the RADIUS Host IP Address(es) . . . . . . . . . . . . . . . . . . . . . 10-25
5. Enable 802.1X Authentication on the Switch . . . . . . . . . . . . . . . . 10-25
6. Optional: Reset Authenticator Operation . . . . . . . . . . . . . . . . . . . . 10-26
7. Optional: Configure 802.1X Controlled Directions . . . . . . . . . . . . 10-26
Wake-on-LAN Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-27
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-27
Example: Configuring 802.1X Controlled Directions . . . . . . . . 10-28
802.1X Open VLAN Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-29
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-29
VLAN Membership Priorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-30
Use Models for 802.1X Open VLAN Modes . . . . . . . . . . . . . . . . . . . . 10-31
Operating Rules for Authorized-Client and
Unauthorized-Client VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-36
Setting Up and Configuring 802.1X Open VLAN Mode . . . . . . . . . . . 10-40
802.1X Open VLAN Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . 10-44
Option For Authenticator Ports: Configure Port-Security
To Allow Only 802.1X-Authenticated Devices . . . . . . . . . . . . . . . . . 10-45