xx
Filter Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-21
Displaying Traffic/Security Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-22
13 Configuring Port-Based and
User-Based Access Control (802.1X)
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1
Why Use Port-Based or User-Based Access Control? . . . . . . . . . . . . 13-1
General Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1
User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
802.1X User-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 13-3
802.1X Port-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . 13-3
Alternative To Using a RADIUS Server . . . . . . . . . . . . . . . . . . . . . 13-4
Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-4
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-5
General 802.1X Authenticator Operation . . . . . . . . . . . . . . . . . . . . . . 13-8
Example of the Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . 13-8
VLAN Membership Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-9
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 13-11
General Setup Procedure for 802.1X Access Control . . . . . . . . . . 13-13
Do These Steps Before You Configure 802.1X Operation . . . . . . . . 13-13
Overview: Configuring 802.1X Authentication on the Switch . . . . . 13-16
Configuring Switch Ports as 802.1X Authenticators . . . . . . . . . . . 13-17
1. Enable 802.1X Authentication on Selected Ports . . . . . . . . . . . . . 13-18
A. Enable the Selected Ports as Authenticators and Enable
the (Default) Port-Based Authentication . . . . . . . . . . . . . . . . . . 13-18
B. Specify User-Based Authentication or Return to
Port-Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-19
Example: Configuring User-Based 802.1X Authentication . . . . 13-20
Example: Configuring Port-Based 802.1X Authentication . . . . 13-20
2. Reconfigure Settings for Port-Access . . . . . . . . . . . . . . . . . . . . . . . 13-21
3. Configure the 802.1X Authentication Method . . . . . . . . . . . . . . . . 13-24
4. Enter the RADIUS Host IP Address(es) . . . . . . . . . . . . . . . . . . . . . 13-25
5. Enable 802.1X Authentication on the Switch . . . . . . . . . . . . . . . . 13-26
6. Optional: Reset Authenticator Operation . . . . . . . . . . . . . . . . . . . . 13-27