EasyManuals Logo

Cisco Catalyst 3750-E User Manual

Cisco Catalyst 3750-E
1414 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #325 background imageLoading...
Page #325 background image
10-41
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-08
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
Configuring 802.1x Authentication
To configure 802.1x port-based authentication, you must enable authentication, authorization, and
accounting (AAA) and specify the authentication method list. A method list describes the sequence and
authentication method to be queried to authenticate a user.
To allow per-user ACLs or VLAN assignment, you must enable AAA authorization to configure the
swi
tch for all network-related service requests.
This is the 802.1x AAA process:
Step 1 A user connects to a port on the switch.
Step 2 Authentication is performed.
Step 3 VLAN assignment is enabled, as appropriate, based on the RADIUS server configuration.
Step 4 The switch sends a start message to an accounting server.
Step 5 Re-authentication is performed, as necessary.
Step 6 The switch sends an interim accounting update to the accounting server that is based on the result of
re-authentication.
Step 3
aaa authentication dot1x {default}
method1
Create an 802.1x authentication method list.
To create a default list that is used when a named list is not s
pecified in
the authentication command, use the default keyword followed by the
method that is to be used in default situations. The default method list is
automatically applied to all ports.
For m
ethod1, enter the group radius keywords to use the list of all
RADIUS servers for authentication.
Note Though other keywords are visible in the command-line help
string, only the group radius keywords are supported.
Step 4
interface interface-id Specify the port connected to the client that is to be enabled for
IEEE 802.1x authentication, and enter interface configuration mode.
Step 5
switchport mode access Set the port to access mode.
Step 6
authentication violation shutdown |
restrict | protect | replace}
or
dot1x violation-mode {shut
down |
restrict | protect}
Configure the violation mode. The keywords have these meanings:
shutdown–Error disable the port.
restrict–Generate a syslog error.
protect–Drop packets from any new device that sends traffic to the
port.
replace–Removes the current session and authenticates with the new
host.
Step 7
end Return to privileged EXEC mode.
Step 8
show authentication
or
show dot1x
Verify your entries.
Step 9
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose

Table of Contents

Other manuals for Cisco Catalyst 3750-E

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3750-E and is the answer not in the manual?

Cisco Catalyst 3750-E Specifications

General IconGeneral
SeriesCatalyst 3750-E
Switching Capacity32 Gbps
Stacking Bandwidth32 Gbps
StackWise PlusYes
Layer SupportLayer 3
MAC Address Table Size12, 000 entries
RAM256 MB
Flash Memory64 MB
Memory256 MB DRAM, 64 MB Flash
Operating Temperature32 to 113°F (0 to 45°C)
Ports48 10/100/1000 Ethernet ports
Form FactorRack-mountable
Jumbo Frame SupportYes
Input Voltage100 to 240 VAC
Storage Temperature-25 to 70 °C
Relative Humidity10 to 90% non-condensing

Related product manuals