10-54
Catalyst 2960 and 2960-S Switch Software Configuration Guide
OL-8603-09
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
Use the show radius statistics privileged EXEC command to display the number of RADIUS messages
that do not receive the accounting response message.
This example shows how to configure 802.1x accounting. The first command configures the RADIUS
server, specifying 1813 as the UDP port for accounting:
Switch(config)# radius-server host 172.120.39.46 auth-port 1812 acct-port 1813 key rad123
Switch(config)# aaa accounting dot1x default start-stop group radius
Switch(config)# aaa accounting system default start-stop group radius
Configuring a Guest VLAN
When you configure a guest VLAN, clients that are not 802.1x-capable are put into the gu est VLAN
when the server does not receive a response to its EAP request/identity frame. Clients that
are 802.1x-capable but that fail authentication are not granted network access. The switch supports guest
VLANs in single-host or multiple-hosts mode.
Beginning in privileged EXEC mode, follow these steps to configure a guest VLAN. This procedure is
optional.
Step 3 aaa accounting dot1x default
start-stop group radius
Enable 802.1x accounting using the list of all RADIUS servers.
Step 4 aaa accounting system default
start-stop group radius
(Optional) Enables system accounting (using the list of all RADIUS
servers) and generates system accounting reload event messages when the
switch reloads.
Step 5 end Return to privileged EXEc mode.
Step 6 show running-config Verify your entries.
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Command Purpose
Command Purpose
Step 1 configure terminal Enter global configuration mode.
Step 2 interface interface-id Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the “802.1x Authentication
Configuration Guidelines” section on page 10-38.
Step 3 switchport mode access Set the port to access mode.
Step 4 authentication port-control auto
or
dot1x port-control auto
Enable 802.1x authentication on the port.
Step 5 dot1x guest-vlan vlan-id Specify an active VLAN as an 802.1x guest VLAN. The range is
1 to 4094.
You can configure any active VLAN except an RSPAN VLAN or a voice
VLAN as an 802.1x guest VLAN.
Step 6 end Return to privileged EXEC mode.