Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6

General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . 10-9

Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 10-9

VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10

General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12

General Setup Procedure for 802.1X Access Control . . . . . . . . . . 10-14Do These Steps Before You Configure 802.1X Operation . . . . . . . . 10-14 Overview: Configuring 802.1X Authentication on the Switch . . . . . 10-17

Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . 10-181. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 10-19

A. Enable the Selected Ports as Authenticators and Enable

the (Default) Port-Based Authentication . . . . . . . . . . . . . . . . . . 10-19

B. Specify User-Based Authentication or Return to Port-Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-20

Example: Configuring User-Based 802.1X Authentication . . . . 10-21

Example: Configuring Port-Based 802.1X Authentication . . . . 10-21 2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . .10-21

3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . . . 10-24

4. Enter the RADIUS Host IP Address(es) . . . . . . . . . . . . . . . . . . . . . 10-25

5. Enable 802.1X Authentication on the Switch . . . . . . . . . . . . . . . . 10-25

6. Optional: Reset Authenticator Operation . . . . . . . . . . . . . . . . . . . . 10-26

7. Optional: Configure 802.1X Controlled Directions . . . . . . . . . . . . 10-26

Wake-on-LAN Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-27

Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-27

Example: Configuring 802.1X Controlled Directions . . . . . . . . 10-28

802.1X Open VLAN Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-29 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-29 VLAN Membership Priorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-30 Use Models for 802.1X Open VLAN Modes . . . . . . . . . . . . . . . . . . . . 10-31

Operating Rules for Authorized-Client and

Unauthorized-Client VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-36 Setting Up and Configuring 802.1X Open VLAN Mode . . . . . . . . . . . 10-40 802.1X Open VLAN Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . 10-44

Option For Authenticator Ports: Configure Port-SecurityTo Allow Only 802.1X-Authenticated Devices . . . . . . . . . . . . . . . . . 10-45

xii