Ports In Authorized And Unauthorized States - Cisco Catalyst 2950 Software Configuration Manual

Hide thumbs Also See for Catalyst 2950:
Table of Contents

Advertisement

Understanding 802.1X Port-Based Authentication
Figure 8-2
Client

Ports in Authorized and Unauthorized States

The switch port state determines whether or not the client is granted access to the network. The port starts in
the unauthorized state. While in this state, the port disallows all ingress and egress traffic except for 802.1X
packets. When a client is successfully authenticated, the port transitions to the authorized state, allowing all
traffic for the client to flow normally.
If a client that does not support 802.1X is connected to an unauthorized 802.1X port, the switch requests
the client's identity. In this situation, the client does not respond to the request, the port remains in the
unauthorized state, and the client is not granted access to the network.
In contrast, when an 802.1X-enabled client connects to a port that is not running 802.1X, the client
initiates the authentication process by sending the EAPOL-start frame. When no response is received,
the client sends the request for a fixed number of times. Because no response is received, the client
begins sending frames as if the port is in the authorized state.
You control the port authorization state by using the dot1x port-control interface configuration
command and these keywords:
Catalyst 2950 Desktop Switch Software Configuration Guide
8-4
Message Exchange
Catalyst 2950 switch
EAPOL-Start
EAP-Request/Identity
EAP-Response/Identity
EAP-Request/OTP
EAP-Response/OTP
EAP-Success
Port Authorized
EAPOL-Logoff
Port Unauthorized
force-authorized—disables 802.1X and causes the port to transition to the authorized state without
any authentication exchange required. The port transmits and receives normal traffic without
802.1X-based authentication of the client. This is the default setting.
force-unauthorized—causes the port to remain in the unauthorized state, ignoring all attempts by
the client to authenticate. The switch cannot provide authentication services to the client through the
interface.
Chapter 8
Configuring 802.1X Port-Based Authentication
Authentication
(RADIUS)
RADIUS Access-Request
RADIUS Access-Challenge
RADIUS Access-Request
RADIUS Access-Accept
server
78-11380-04

Advertisement

Table of Contents
loading

Table of Contents