9-27
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter9 Configuring IEEE 802 . 1x Port-Based Authentication Configuring IEEE 802.1x Authentication
Step4 The switch sends a start message to an accounting server.
Step5 Re-authentication is performed, as necessary.
Step6 The switch sends an interim accounting update to the accounting server that is based on the result of
re-authentication.
Step7 The user disconnects from the port.
Step8 The switch sends a stop message to the accounting server.
Beginning in privileged EXEC mode, follow these steps to configure IEEE 802.1x port- based
authentication:
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 aaa new-model Enable AAA.
Step3 aaa authentication dot1x {default}
method1 Create an IEEE 802.1x authentication method list.
To create a default list that is used when a named list is not specified in
the authentication command, use the default keyword followed by the
method that is to be used in default situations. The default method list is
automatically applied to all ports.
For method1, enter the group radius keywords to use the list of all
RADIUS servers for authentication.
Note Though other keywords are visible in the command-line help
string, only the group radius keywords are supported.
Step4 dot1x system-auth-control Enable IEEE 802.1x authentication globally on the switch.
Step5 aaa authorization network {default}
group radius (Optional) Configure the switch to use user-RADIUS authorization for all
network-related service requests, such as per-user ACLs or VLAN
assignment.
Note For per-user ACLs, single-host mode must be configured. This
setting is the default.
Step6 radius-server host ip-address (Optional) Specify the IP address of the RADIUS server.
Step7 radius-server key string (Optional) Specify the authentication and encryption key used between
the switch and the RADIUS daemon running on the RADIUS server.
Step8 interface interface-id Specify the port connected to the client that is to be enabled for
IEEE 802.1x authentication, and enter interface configuration mode.
Step9 switchport mode access (Optional) Set the port to access mode only if you configured the RADIUS
server in Step 6 and Step 7.
Step10 dot1x port-control auto Enable IEEE 802.1x authentication on the port.
For feature interaction information, see the “IEEE 802.1x Authentication
Configuration Guidelines” section on page9-24.
Step11 end Return to privileged EXEC mode.
Step12 show dot1x Verify your entries.
Step13 copy running-config startup-config (Optional) Save your entries in the configuration file.