Understanding Ieee 802.1X Port-Based Authentication - Cisco 3032 Software Configuration Manual

Hide thumbs Also See for 3032:
Table of Contents

Advertisement

Configuring IEEE 802.1x Port-Based
Authentication
This chapter describes how to configure IEEE 802.1x port-based authentication on the switch.
IEEE 802.1x authentication prevents unauthorized devices (clients) from gaining access to the
network.Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack.
For complete syntax and usage information for the commands used in this chapter, see the "RADIUS
Note
Commands" section in the Cisco IOS Security Command Reference, Release 12.2 and the command
reference or this release.
This chapter consists of these sections:

Understanding IEEE 802.1x Port-Based Authentication

The IEEE 802.1x standard defines a client-server-based access control and authentication protocol that
prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they
are properly authenticated. The authentication server authenticates each client connected to a switch port
before making available any services offered by the switch or the LAN.
Until the client is authenticated, 802.1x access control allows only Extensible Authentication Protocol
over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic
through the port to which the client is connected. After authentication is successful, normal traffic can
pass through the port.
These sections describe 802.1x port-based authentication:
OL-12247-04
Understanding IEEE 802.1x Port-Based Authentication, page 9-1
Configuring 802.1x Authentication, page 9-31
Displaying 802.1x Statistics and Status, page 9-65
Device Roles, page 9-3
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
9
C H A P T E R
9-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

3130

Table of Contents