Using Ieee 802.1X Authentication With Vlan Assignment - Cisco 3020 - Catalyst Blade Switch Configuration Manual

Cisco catalyst blade switch 3020 for hp software configuration guide, rel. 12.2(25)sef1
Hide thumbs Also See for 3020 - Cisco Catalyst Blade Switch:
Table of Contents

Advertisement

Understanding IEEE 802.1x Port-Based Authentication
Table 7-1
Attribute Number
Attribute[46]
Attribute[49]
Attribute[61]
1. The Framed-IP-Address AV pair is sent only if a valid Dynamic Host Control Protocol (DHCP) binding
You can view the AV pairs that are being sent by the switch by entering the debug radius accounting
privileged EXEC command. For more information about this command, see the Cisco IOS Debug
Command Reference, Release 12.2 at this URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_command_reference_book09186a008
00872ce.html
For more information about AV pairs, see RFC 3580, "IEEE 802.1X Remote Authentication Dial In User
Service (RADIUS) Usage Guidelines."

Using IEEE 802.1x Authentication with VLAN Assignment

he RADIUS server sends the VLAN assignment to configure the switch port. The RADIUS server
database maintains the username-to-VLAN mappings, assigning the VLAN based on the username of
the client connected to the switch port. You can use this feature to limit network access for certain users.
When configured on the switch and the RADIUS server, IEEE 802.1x authentication with VLAN
assignment has these characteristics:
When the port is in the force authorized, force unauthorized, unauthorized, or shutdown state, it is put
into the configured access VLAN.
If an IEEE 802.1x port is authenticated and put in the RADIUS server-assigned VLAN, any change to
the port access VLAN configuration does not take effect.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
7-10
Accounting AV Pairs (continued)
AV Pair Name
Acct-Session-Time
Acct-Terminate-Cause
NAS-Port-Type
exists for the host in the DHCP snooping bindings table.
If no VLAN is supplied by the RADIUS server or if IEEE 802.1x authentication is disabled, the port
is configured in its access VLAN after successful authentication. Recall that an access VLAN is a
VLAN assigned to an access port. All packets sent from or received on this port belong to this
VLAN.
If IEEE 802.1x authentication is enabled but the VLAN information from the RADIUS server is not
valid, the port returns to the unauthorized state and remains in the configured access VLAN. This
prevents ports from appearing unexpectedly in an inappropriate VLAN because of a configuration
error.
Configuration errors could include specifying a malformed VLAN ID, a nonexistent VLAN ID, or
an attempted assignment to a voice VLAN ID.
If IEEE 802.1x authentication is enabled and all information from the RADIUS server is valid, the
port is placed in the specified VLAN after authentication.
If the multiple-hosts mode is enabled on an IEEE 802.1x port, all hosts are placed in the same VLAN
(specified by the RADIUS server) as the first authenticated host.
If IEEE 802.1x authentication and port security are enabled on a port, the port is placed in the
RADIUS server-assigned VLAN.
If IEEE 802.1x authentication is disabled on the port, it is returned to the configured access VLAN.
Chapter 7
Configuring IEEE 802.1x Port-Based Authentication
START
INTERIM
Never
Never
Never
Never
Always
Always
STOP
Always
Always
Always
OL-8915-01

Advertisement

Table of Contents
loading

Table of Contents