802.1X Port-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 12-5

Alternative To Using a RADIUS Server . . . . . . . . . . . . . . . . . . . . . 12-6

Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6

Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6

General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . 12-9

Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 12-9

VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-10

General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12

General Setup Procedure for 802.1X Access Control . . . . . . . . . . 12-15Do These Steps Before You Configure 802.1X Operation . . . . . . . . 12-15 Overview: Configuring 802.1X Authentication on the Switch . . . . . 12-18

Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . 12-191. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 12-20

A. Enable the Selected Ports as Authenticators and Enable

the (Default) Port-Based Authentication . . . . . . . . . . . . . . . . . . 12-20

B. Specify User-Based Authentication or Return to

Port-Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-21 Example: Configuring User-Based 802.1X Authentication . . . . 12-22 Example: Configuring Port-Based 802.1X Authentication . . . . 12-22 2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . .12-22

3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . . . 12-26

4. Enter the RADIUS Host IP Address(es) . . . . . . . . . . . . . . . . . . . . . 12-27

5. Enable 802.1X Authentication on the Switch . . . . . . . . . . . . . . . . 12-27

6. Optional: Reset Authenticator Operation . . . . . . . . . . . . . . . . . . . . 12-28

7. Optional: Configure 802.1X Controlled Directions . . . . . . . . . . . . 12-28

Wake-on-LAN Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-29

Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-29

Example: Configuring 802.1X Controlled Directions . . . . . . . . 12-30

802.1X Open VLAN Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-31 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-31 VLAN Membership Priorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-32 Use Models for 802.1X Open VLAN Modes . . . . . . . . . . . . . . . . . . . . 12-33

Operating Rules for Authorized-Client and

Unauthorized-Client VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-38 Setting Up and Configuring 802.1X Open VLAN Mode . . . . . . . . . . . 12-42

xv