EasyManuals Logo

Cisco IE-5000 User Manual

Cisco IE-5000
1066 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #218 background imageLoading...
Page #218 background image
214
Configuring IEEE 802.1x Port-Based Authentication
Information About Configuring IEEE 802.1x Port-Based Authentication
For more information, see Configuring an Authenticator, page 230.
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id
Attribute
The switch supports both IP standard and IP extended port access control lists (ACLs) applied to ingress ports.
ACLs that you configure
ACLs from the Access Control Server (ACS)
An IEEE 802.1x port in single-host mode uses ACLs from the ACS to provide different levels of service to an IEEE
802.1x-authenticated user. When the RADIUS server authenticates this type of user and port, it sends ACL attributes
based on the user identity to the switch. The switch applies the attributes to the port for the duration of the user session.
If the session is over, authentication fails, or a link fails, the port becomes unauthorized, and the switch removes the ACL
from the port.
Only IP standard and IP extended port ACLs from the ACS support the Filter-Id attribute. It specifies the name or number
of an ACL. The Filter-id attribute can also specify the direction (inbound or outbound) and a user or a group to which the
user belongs.
The Filter-Id attribute for the user takes precedence over that for the group.
If a Filter-Id attribute from the ACS specifies an ACL that is already configured, it takes precedence over a
user-configured ACL.
If the RADIUS server sends more than one Filter-Id attribute, only the last attribute is applied.
If the Filter-Id attribute is not defined on the switch, authentication fails, and the port returns to the unauthorized state.
Authentication Manager Common Session ID
Authentication manager uses a single session ID (referred to as a common session ID) for a client no matter which
authentication method is used. This ID is used for all reporting purposes, such as the show commands and MIBs. The
session ID appears with all per-session syslog messages.
The session ID includes:
The IP address of the Network Access Device (NAD)
A monotonically increasing unique 32-bit integer
The session start time stamp (a 32-bit integer)
Default 802.1x Authentication Settings
Table 30 on page 214 shows the default 802.1x authentication settings.
Table 30 Default 802.1x Authentication Settings
Feature Default Setting
Switch 802.1x enable state Disabled.
Per-port 802.1x enable state Disabled (force-authorized).
The port sends and receives normal traffic without 802.1x-based
authentication of the client.
AAA Disabled.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco IE-5000 and is the answer not in the manual?

Cisco IE-5000 Specifications

General IconGeneral
ModelIE-5000
CategoryIndustrial Ethernet Switch
Switching Capacity128 Gbps
Forwarding Rate95.2 Mpps
MAC Address Table Size16, 000 entries
Ports16 or 24 10/100/1000 ports
Uplink Ports4 SFP ports
Operating Temperature-40°C to 70°C
Power SupplyDual redundant power supplies
MountingDIN rail
ManagementWeb GUI, CLI, SNMP
Input Voltage24 VDC or 110/220 VAC
LayerLayer 2/3
Jumbo Frame SupportUp to 9216 bytes

Related product manuals