CHAPT ER
10-1
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
10
Configuring IEEE 802.1x Port-Based Authentication
IEEE 802.1x port-based authentication prevents unauthorized devices (clients) from gaining access to
the network.
The Catalyst 3560 switch command reference and the “RADIUS Commands” section in the Cisco IOS
Security Command Reference, Release 12.2, have command syntax and usage information.
Understanding IEEE 802.1x Port-Based Authentication, page 10-1
Configuring 802.1x Authentication, page 10-29
Displaying 802.1x Statistics and Status, page 10-65

Understanding IEEE 802.1x Port-Based Authentication

The standard defines a client-server-based access control and authentication protocol that prevents
clients from connecting to a LAN through publicly accessible ports unless they are authenticated. The
authentication server authenticates each client connected to a switch port before making available any
switch or LAN services.
Until the client is authenticated, IEEE 802.1x access control allows only Extensible Authentication
Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP)
traffic through the port to which the client is connected. After authentication, normal traffic passes
through the port.
Device Roles, page 10-2
Authentication Process, page 10-3
Authentication Initiation and Message Exchange, page 10-5
Authentication Manager, page 10-7
Ports in Authorized and Unauthorized States, page 10-9
802.1x Host Mode, page 10-10
Multidomain Authentication, page 10-11
802.1x Multiple Authentication Mode, page 10-12
802.1x Accounting, page 10-12
802.1x Accounting Attribute-Value Pairs, page 10-13
802.1x Readiness Check, page 10-14