Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Switch Ports as 802.1X Authenticators

A. Enable the Selected Ports as Authenticators and Enable the (Default) Port-Based Authentication

Syntax: [ no ] aaa port-access authenticator < port-list>

Enables specified ports to operate as 802.1X authenticators and enables port-based authentication. (To enable client- based authentication, execute this command first, and then execute the client-limit < port-list > version of this command described in the next section.) The no form of the command removes 802.1X authentication from < port-list>. To activate configured 802.1X operation, you must enable 802.1X authentication. Refer to “5. Enable 802.1X Authentication on the switch” on page 8-15.

B.Specify Client-Based or Return to Port-Based 802.1X Authentication

Client-Based 802.1X Authentication.

Syntax: aaa port-access authenticator client-limit < port-list> < 1 - 2>

Used after executing aaa port-access authenticator < port-list> (above) to convert authentication from port-based to client- based. Specifies client-based 802.1X authentication and the maximum number of 802.1X-authenticated client sessions allowed on each of the ports in < port-list>. If a port currently has no authenticated client sessions, the next authenticated client session the port accepts determines the untagged VLAN membership to which the port is assigned during the session. If another client session begins later on the same port while an earlier session is active, the later session will be on the same untagged VLAN membership as the earlier session.

8-18