Cisco 2950G 24 Software Configuration Guide - Page 222
Enabling 802.1X Authentication
UPC - 746320687711
View all Cisco 2950G 24 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 222 highlights
Configuring 802.1X Authentication Chapter 8 Configuring 802.1X Port-Based Authentication Enabling 802.1X Authentication To enable 802.1X port-based authentication, you must enable AAA and specify the authentication method list. A method list describes the sequence and authentication methods to be queried to authenticate a user. The software uses the first method listed to authenticate users; if that method fails to respond, the software selects the next authentication method in the method list. This process continues until there is successful communication with a listed authentication method or until all defined methods are exhausted. If authentication fails at any point in this cycle, the authentication process stops, and no other authentication methods are attempted. Beginning in privileged EXEC mode, follow these steps to configure 802.1X port-based authentication. This procedure is required. Step 1 Step 2 Step 3 Command configure terminal aaa new-model aaa authentication dot1x {default} method1 [method2...] Step 4 interface interface-id Step 5 dot1x port-control auto Step 6 end Step 7 show dot1x Step 8 copy running-config startup-config Purpose Enter global configuration mode. Enable AAA. Create an 802.1X authentication method list. To create a default list that is used when a named list is not specified in the authentication command, use the default keyword followed by the methods that are to be used in default situations. The default method list is automatically applied to all interfaces. Enter at least one of these keywords: • group radius-Use the list of all RADIUS servers for authentication. • none-Use no authentication. The client is automatically authenticated by the switch without using the information supplied by the client. Enter interface configuration mode, and specify the interface connected to the client that is to be enabled for 802.1X authentication. Enable 802.1X authentication on the interface. For feature interaction information with trunk, dynamic, dynamic-access, EtherChannel, secure, and SPAN ports, see the "802.1X Configuration Guidelines" section on page 8-7. Return to privileged EXEC mode. Verify your entries. Check the Status column in the 802.1X Port Summary section of the display. An enabled status means the port-control value is set either to auto or to force-unauthorized. (Optional) Save your entries in the configuration file. To disable AAA, use the no aaa new-model global configuration command. To disable 802.1X AAA authentication, use the no aaa authentication dot1x {default | list-name} method1 [method2...] global configuration command. To disable 802.1X authentication, use the dot1x port-control force-authorized or the no dot1x port-control interface configuration command. Catalyst 2950 Desktop Switch Software Configuration Guide 8-8 78-14982-01