40-68
Software Configuration Guide—Release 15.0(2)SG
OL-23818-01
Chapter 40 Configuring 802.1X Port-Based Authentication
Configuring 802.1X Port-Based Authentication
Figure 40-15 VLAN User Distribution on ACS: Multiple VLAN Numbers Configured per User
After you complete these two tasks and receive authorization, ACS sends the configured VLAN group
to the switch. The switch is alerted to the list of VLANs configured under the VLAN group, and the least
loaded valid VLAN in the group is assigned to the port.
Configuring 802.1X with Authentication Failed
By configuring authentication-failed VLAN alignment on any Layer 2 port on the Catalyst 4500 series
switch, you can provide limited network services to clients that fail the authentication process.
Note You can use authentication-failed VLAN assignment with other security features, such as Dynamic ARP
Inspection (DAI), Dynamic Host Configuration Protocol (DHCP) snooping, and IP Source Guard. Each
of these features can be enabled and disabled independently on the authentication-failed VLAN.
To configure 802.1X with authentication-failed VLAN assignment, perform this task:
Command Purpose
Step 1 Switch# configure terminal Enters global configuration mode.
Step 2 Switch(config)# interface
interface-id Enters interface configuration mode and specifies the interface to be
enabled for 802.1X authentication.
Step 3 Switch(config-if)# switchport mode
access Specifies a nontrunking, nontagged single VLAN Layer 2 interface.
Step 4 Switch(config-if)# authentication
port-control auto Enables 802.1X authentication on the interface.