220
Configuring IEEE 802.1x Port-Based Authentication
How to Configure IEEE 802.1x Port-Based Authentication
Configuring 802.1x Readiness Check
Command Purpose
1. configure terminal Enters global configuration mode.
2. radius-server host {hostname |
ip-address} auth-port port-number key
string
Configures the RADIUS server parameters.
hostname | ip-address—Specifies the hostname or IP address of the
remote RADIUS server.
auth-port port-number—Specifies the UDP destination port for
authentication requests. The default is 1812. The range is 0 to 65536.
key string—Specifies the authentication and encryption key used between
the switch and the RADIUS daemon running on the RADIUS server. The
key is a text string that must match the encryption key used on the
RADIUS server.
Note: Always configure the key as the last item in the radius-server host
command syntax because leading spaces are ignored, but spaces within
and at the end of the key are used. If you use spaces in the key, do not
enclose the key in quotation marks unless the quotation marks are part of
the key. This key must match the encryption used on the RADIUS daemon.
If you want to use multiple RADIUS servers, reenter this command.
3. end Returns to privileged EXEC mode.
4. show running-config Verifies your entries.
5. copy running-config startup-config (Optional) Saves your entries in the configuration file.
Command Purpose
1. dot1x test eapol-capable [interface
interface-id]
Enables the 802.1x readiness check on the switch.
interface-id—Specifies the port on which to check for 802.1x readiness.
Note: If you omit the optional interface keyword, all interfaces on the
switch are tested.
1. configure terminal (Optional) Enters global configuration mode.
2. dot1x test timeout timeout (Optional) Configures the timeout used to wait for EAPOL response. The
range is from 1 to 65535 seconds. The default is 10 seconds.
3. end (Optional) Returns to privileged EXEC mode.
4. show running-config (Optional) Verifies your modified timeout values.