Configuring 802.1x Port Security
In this chapter
Overview of 802.1x port security
The BigIron RX software release 02.2.01 and later supports the IEEE 802.1x standard for
authenticating devices attached to LAN ports. Using 802.1x port security, you can configure a
BigIron RX to grant access to a port based on information supplied by a client to an authentication
server.
When a user logs on to a network that uses 802.1x port security, the BigIron RX grants (or does not
grant) access to network services after the user is authenticated by an authentication server. The
user-based authentication in 802.1x port security provides an alternative to granting network
access based on a user's IP address, MAC address, or subnetwork..
IETF RFC support
Brocade's implementation of 802.1x port security supports the following RFCs:
•
•
•
How 802.1x port security works
This section explains the basic concepts behind 802.1x port security, including device roles, how
the devices communicate, and the procedure used for authenticating clients.
Device roles in an 802.1x configuration
The 802.1x standard defines the roles of Client/Supplicant, Authenticator, and Authentication
Server in a network.
BigIron RX Series Configuration Guide
53-1001810-01
•
Overview of 802.1x port security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953
•
How 802.1x port security works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953
•
802.1x port security and sFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 960
•
Configuring 802.1x port security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 960
•
Displaying 802.1x information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 972
•
Sample 802.1x configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979
RFC 2284 PPP Extensible Authentication Protocol (EAP)
RFC 2865 Remote Authentication Dial In User Service (RADIUS)
RFC 2869 RADIUS Extensions
Chapter
33
953