Cisco Catalyst 3750-X Software Configuration Manual page 297

Hide thumbs Also See for Catalyst 3750-X:
Table of Contents

Advertisement

Chapter 11
Configuring IEEE 802.1x Port-Based Authentication
Figure 11-3
Client
If 802.1x authentication times out while waiting for an EAPOL message exchange and MAC
authentication bypass is enabled, the switch can authorize the client when the switch detects an Ethernet
packet from the client. The switch uses the MAC address of the client as its identity and includes this
information in the RADIUS-access/request frame that is sent to the RADIUS server. After the server
sends the switch the RADIUS-access/accept frame (authorization is successful), the port becomes
authorized. If authorization fails and a guest VLAN is specified, the switch assigns the port to the guest
VLAN. If the switch detects an EAPOL packet while waiting for an Ethernet packet, the switch stops
the MAC authentication bypass process and stops 802.1x authentication.
Figure 11-4
Figure 11-4
Client
OL-21521-01
Message Exchange
EAPOL-Start
EAP-Request/Identity
EAP-Response/Identity
EAP-Request/OTP
EAP-Response/OTP
EAP-Success
Port Authorized
EAPOL-Logoff
Port Unauthorized
shows the message exchange during MAC authentication bypass.
Message Exchange During MAC Authentication Bypass
Switch
EAPOL Request/Identity
EAPOL Request/Identity
EAPOL Request/Identity
Ethernet packet
Understanding IEEE 802.1x Port-Based Authentication
Authentication
(RADIUS)
RADIUS Access-Request
RADIUS Access-Challenge
RADIUS Access-Request
RADIUS Access-Accept
Authentication
(RADIUS)
RADIUS Access/Request
RADIUS Access/Accept
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
server
server
11-7

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3560-x

Table of Contents