Network Admission Control Layer 2 Ieee 802.1X Validation; Using Web Authentication - Cisco WS-C3020 Software Configuration Manual

Catalyst blade switch for hp
Table of Contents

Advertisement

Understanding IEEE 802.1x Port-Based Authentication

Network Admission Control Layer 2 IEEE 802.1x Validation

In Cisco IOS Release 12.2(44)SE and later, the switch supports the Network Admission Control (NAC)
Layer 2 IEEE 802.1x validation, which checks the antivirus condition or posture of endpoint systems or
clients before granting the devices network access. With NAC Layer 2 IEEE 802.1x validation, you can
do these tasks:
Configuring NAC Layer 2 IEEE 802.1x validation is similar to configuring IEEE 802.1x port-based
authentication except that you must configure a posture token on the RADIUS server. For information
about configuring NAC Layer 2 IEEE 802.1x validation, see the
Validation" section on page 8-39
page
For more information about NAC, see the Network Admission Control Software Configuration Guide.

Using Web Authentication

You can use a web browser to authenticate a client that does not support IEEE 802.1x functionality. This
feature can authenticate up to eight users on the same shared port and apply the appropriate policies for
each end host on a shared port.
You can configure a port to use only web authentication. You can also configure the port to first try and
use IEEE 802.1x authentication and then to use web authorization if the client does not support
IEEE 802.1x authentication.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
8-18
Restricted VLAN—This feature is not supported when the client connected to an IEEE 802.lx port
is authenticated with MAC authentication bypass.
Port security—See the
"Using IEEE 802.1x Authentication with Port Security" section on
page
8-15.
Voice VLAN—See the
"Using IEEE 802.1x Authentication with Voice VLAN Ports" section on
page
8-15.
VLAN Membership Policy Server (VMPS)—IEEE802.1x and VMPS are mutually exclusive.
Private VLAN—You can assign a client to a private VLAN.
Network admission control (NAC) Layer 2 IP validation—This feature takes effect after an
IEEE 802.1x port is authenticated with MAC authentication bypass, including hosts in the exception
list.
Download the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action
RADIUS attribute (Attribute[29]) from the authentication server.
Set the number of seconds between re-authentication attempts as the value of the Session-Timeout
RADIUS attribute (Attribute[27]) and get an access policy against the client from the RADIUS
server.
Set the action to be taken when the switch tries to re-authenticate the client by using the
Termination-Action RADIUS attribute (Attribute[29]). If the value is the DEFAULT or is not set, the
session ends. If the value is RADIUS-Request, the re-authentication process starts.
View the NAC posture token, which shows the posture of the client, by using the show dot1x
privileged EXEC command.
Configure secondary private VLANs as guest VLANs.
8-28.
Chapter 8
and the
"Configuring Periodic Re-Authentication" section on
Configuring IEEE 802.1x Port-Based Authentication
"Configuring NAC Layer 2 IEEE 802.1x
OL-8915-03

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3020

Table of Contents