Configuring
Overview
•Supplicant implementation using CHAP authentication and indepen- dent username and password configuration on each port.
■Prevention of traffic flow in either direction on unauthorized ports.
■Local authentication of 802.1X clients using the switch’s local user- name and password (as an alternative to RADIUS authentication).
■Temporary
■Session accounting with a RADIUS server, including the accounting update interval.
■Use of Show commands to display session counters.
User Authentication Methods
The switch offers two methods for using 802.1X access control. Generally, the “Port Based” method supports one
802.1X
802.1X operation with access control on a