49-2
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 49 Configuring 802.1X Port-Based Authentication
About 802.1X Port-Based Authentication
• Ports in Authorized and Unauthorized States, page 49-4
• 802.1X Host Mode, page 49-6
• 802.1X Violation Mode, page 49-8
• Using MAC Move, page 49-9
• Using MAC Replace, page 49-9
• Using 802.1X with VLAN Assignment, page 49-9
• Using 802.1X for Guest VLANs, page 49-10
• Using 802.1X with MAC Authentication Bypass, page 49-11
• Using 802.1X with Web-Based Authentication, page 49-13
• Using 802.1X with Inaccessible Authentication Bypass, page 49-14
• Using 802.1X with Unidirectional Controlled Port, page 49-15
• Using 802.1X with VLAN User Distribution, page 49-15
• Using 802.1X with Authentication Failed VLAN Assignment, page 49-16
• Using 802.1X with Port Security, page 49-18
• Using 802.1X Authentication with ACL Assignments and Redirect URLs, page 49-19
• Using 802.1X with RADIUS-Provided Session Timeouts, page 49-20
• Using 802.1X with Voice VLAN Ports, page 49-21
• Using Voice Aware 802.1x Security, page 49-21
• Using Multiple Domain Authentication and Multiple Authentication, page 49-22
• Multi-Authentication Per User VLAN Authentication, page 49-23
• Limiting Login for Users, page 49-24
• 802.1X Supplicant and Authenticator Switches with Network Edge Access Topology, page 49-24
• How 802.1X Fails on a Port, page 49-25
• Supported Topologies, page 49-26
Device Roles
With 802.1X port-based authentication, network devices have specific roles. Figure 49-1 shows the role of each device, which
is described below.