6
Configuring Port-Based Access Control (802.1x)
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How 802.1x Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Do These Steps Before You Configure 802.1x Operation . . . . . . . . .
Overview: Configuring 802.1x Authentication on the Switch . . . . . .
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Operating Rules for
Option For Authenticator Ports: Configure
Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Displaying 802.1x Configuration, Statistics, and Counters . . . . . .
Messages Related to 802.1x Operation . . . . . . . . . . . . . . . . . . . . . . . .