10

Configuring Port-Based and

User-Based Access Control (802.1X)

Contents

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3

Why Use Port-Based or User-Based Access Control? . . . . . . . . . . . . 10-3

General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3

User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4

802.1X User-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 10-4

802.1X Port-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 10-5

Alternative To Using a RADIUS Server . . . . . . . . . . . . . . . . . . . . . 10-6

Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6

Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6

General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . 10-9

Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 10-9

VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10

General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12

General Setup Procedure for 802.1X Access Control . . . . . . . . . . 10-14Do These Steps Before You Configure 802.1X Operation . . . . . . . . 10-14 Overview: Configuring 802.1X Authentication on the Switch . . . . . 10-17

Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . 10-181. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 10-19

A. Enable the Selected Ports as Authenticators and Enable

the (Default) Port-Based Authentication . . . . . . . . . . . . . . . . . . 10-19

B. Specify User-Based Authentication or Return to Port-Based

Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-20

Example: Configuring User-Based 802.1X Authentication . . . . 10-21

Example: Configuring Port-Based 802.1X Authentication . . . . 10-21 2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . .10-21

10-1