13-34
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Chapter 13 Configuring IEEE 802.1x Port-Based Authentication
How to Configure IEEE 802.1x Port-Based Authentication
If the port is in the authorized state, the port remains in this state until reauthorization occurs.
You can configure a timeout period for hosts that are connected by MAC authentication bypass but
are inactive. The range is 1to 65535 seconds.

Maximum Number of Allowed Devices Per Port Guidelines

This is the maximum number of devices allowed on an 802.1x-enabled port:
In single-host mode, only one device is allowed on the access VLAN. If the port is also configured with
a voice VLAN, an unlimited number of Cisco IP phones can send and receive traffic through the voice
VLAN.
In multidomain authentication (MDA) mode, one device is allowed for the access VLAN, and one
IP phone is allowed for the voice VLAN.
In multiple-host mode, only one 802.1x supplicant is allowed on the port, but an unlimited number
of non-802.1x hosts are allowed on the access VLAN. An unlimi ted number of devices are allowed
on the voice VLAN.
How to Configure IEEE 802.1x Port-Based Authentication

802.1x Authentication Configuration Process

To configure 802.1x port-based authentication, you must enable authentication, authorization, and
accounting (AAA) and specify the authentication method list. A method list describes the sequence and
authentication method to be queried to authenticate a user.
To allow per-user ACLs or VLAN assignment, you must enable AAA auth orization to configure the
switch for all network-related service requests.
This is the 802.1x AAA configuration process:
Step 1 A user connects to a port on the switch.
Step 2 Authentication is performed.
Step 3 The VLAN assignment is enabled, as appropriate, based on the RADIUS server configuration.
Step 4 The switch sends a start message to an accounting server.
Step 5 Reauthentication is performed, as necessary.
Step 6 The switch sends an interim accounting update to the accounting server, that is based on the result of
reauthentication.
Step 7 The user disconnects from the port.
Step 8 The switch sends a stop message to the accounting server.