Ports In Authorized And Unauthorized States - Cisco 3032 Software Configuration Manual

Hide thumbs Also See for 3032:
Table of Contents

Advertisement

Chapter 9
Configuring IEEE 802.1x Port-Based Authentication
Table 9-2
Authentication Manager Commands and Earlier 802.1x Commands (continued)
The authentication manager
commands in Cisco IOS
Release 12.2(50)SE or later
authentication fallback
fallback-profile
authentication host-mode
[multi-auth | multi-domain |
multi-host | single-host]
authentication order
authentication periodic
authentication port-control {auto
| force-authorized | force-un
authorized}
authentication timer
authentication violation {protect |
restrict | shutdown}
show authentication
For more information, see the command reference for this release.

Ports in Authorized and Unauthorized States

During 802.1x authentication, depending on the switch port state, the switch can grant a client access to
the network. The port starts in the unauthorized state. While in this state, the port that is not configured
as a voice VLAN port disallows all ingress and egress traffic except for 802.1x authentication, CDP, and
STP packets. When a client is successfully authenticated, the port changes to the authorized state,
allowing all traffic for the client to flow normally. If the port is configured as a voice VLAN port, the
port allows VoIP traffic and 802.1x protocol packets before the client is successfully authenticated.
If a client that does not support 802.1x authentication connects to an unauthorized 802.1x port, the
switch requests the client's identity. In this situation, the client does not respond to the request, the port
remains in the unauthorized state, and the client is not granted access to the network.
In contrast, when an 802.1x-enabled client connects to a port that is not running the 802.1x standard, the
client initiates the authentication process by sending the EAPOL-start frame. When no response is
received, the client sends the request for a fixed number of times. Because no response is received, the
client begins sending frames as if the port is in the authorized state.
OL-12247-04
The equivalent 802.1x commands in
Cisco IOS Release 12.2(46)SE and
earlier
dot1x fallback fallback-profile
dot1x host-mode {single-host |
multi-host | multi-domain}
dot1x mac-auth-bypass
dot1x reauthentication
dot1x port-control {auto |
force-authorized |
force-unauthorized}
dot1x timeout
dot1x violation-mode {shutdown
| restrict | protect}
show dot1x
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
Understanding IEEE 802.1x Port-Based Authentication
Description
Configure a port to use web authentication as a
fallback method for clients that do not support
802.1x authentication.
Allow a single host (client) or multiple hosts on
an 802.1x-authorized port.
Enable the MAC authentication bypass feature.
Enable periodic re-authentication of the client.
Enable manual control of the authorization state of
the port.
Set the 802.1x timers.
Configure the violation modes that occur when a
new device connects to a port or when a new
device connects to a port after the maximum
number of devices are connected to that port.
Display 802.1x statistics, administrative status,
and operational status for the switch or for the
specified port.
9-11

Advertisement

Table of Contents
loading

This manual is also suitable for:

3130

Table of Contents