CHAPT ER
11-1
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
11
Configuring IEEE 802.1x Port-Based Authentication
This chapter describes how to configure IEEE 802.1x port-based authentication on the Catalyst3750-X
or 3560-X switch. IEEE802.1x authentication prevents unauthorized devices (clients) from gaining
access to the network.Unless otherwise noted, the term switch refers to a Catalyst3750-X or 3560-X
standalone switch and to a Catalyst3750-X switch stack.
Note For complete syntax and usage information for the commands used in this chapter, see the “RADIUS
Commands” section in the Cisco IOS Security Command Reference, Release 12.2 and the command
reference or this release.
Switches running the IP base or IP services feature set also support Cisco TrustSec Security Group Tag
(SGT) Exchange Protocol (SxP). This feature supports security group access control lists (SGACLs),
which define ACL policies for a group of devices instead of an IP address. The SXP control protocol
allows carrying the SGT information between access-layer devices at the Cisco TrustSec domain edge,
and distribution layer devices within the Cisco TrustSec domain when the access-layer devices do not
have the hardware capability to tag the packets. These switches operate as access layer switches in the
Cisco TrustSec network.
For more information about Cisco TrustSec, see the “Cisco TrustSec Switch Configuration Guide” at this
URL:
http://www.cisco.com/en/US/docs/switches/lan/trustsec/configuration/guide/trustsec.html
The sections on SXP define the capabilities supported on the switch.
This chapter consists of these sections:
Understanding IEEE 802.1x Port-Based Authentication, page 11-1
Configuring 802.1x Authentication, page11-34
Displaying 802.1x Statistics and Status, page11-69

Understanding IEEE 802.1x Port-Based Authentication

The IEEE 802.1x standard defines a client-server-based access control and authentication protocol that
prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they
are properly authenticated. The authentication server authenticates each client connected to a switch port
before making available any services offered by the switch or the LAN.