Page 1
LAN port and of preventing access to that port in cases where the authentication process fails. Avaya G250 and G350 Media Gateways support 802.1X as authenticators and Avaya IP telephones support 802.1X as supplicants. These Application Notes provide the steps necessary to configure 802.1X on the Avaya G350 Media Gateway and the Avaya IP...
Page 2
EAPOL- start frame, which prompts the switch to request the client's identity. Figure 1 shows typical flows for the Avaya IP telephone, the Avaya G250 or G350 Media Gateway and an authentication server using the EAP-MD5 authentication.
Page 3
Figure 1: 802.1X Message Exchanges The following describes the 802.1X flows for Figure 1: 1. The supplicant (the Avaya IP telephone) sends an “EAPOL Start” packet to the authenticator (Avaya G250 or G350 Media Gateway). 2. The authenticator responds with an “EAP-Request/Identity” packet to the supplicant.
Page 4
8. When the supplicant is logged off, the supplicant sends an EAPOL-Logoff message, and the authenticator blocks access to the LAN. The Avaya G250 and G350 Media Gateways support the following EAP types: MD5, PEAP, TTLS and TLS. The Avaya IP telephones support EAP-MD5 authentication. Figure 2 shows the network diagram used in these Application Notes.
Page 6
3 Configurations The Avaya G250 and G350 Media Gateways can control the port authorization state. Three control modes can be configured on a port: • Force-authorized – Disables 802.1X port-based authentication and causes the port to transition to the authorized state without any authentication exchange required.
Page 7
PC into different VLANs, configure a port with an untagged VLAN for the attached PC and a static-VLAN for the Avaya IP telephone. The following screen shows how to configure port 6/1 with an untagged VLAN 89 for the attached PC and a static-VLAN 88 for an Avaya IP telephone.
Page 8
Gateway and IP Telephones without Requiring the Attached PCs to Authenticate This section describes how to configure the Avaya G350 Media Gateway and an IP telephone so that the IP telephone will be used to authenticate the port. Note that in this case a PC attached to the phone will be allowed access without requiring it to authenticate.
Page 9
If an IP telephone with the attached PC is connected to that port, the IP telephone and the PC have to be authenticated independently. When a port is configured to the MAC-based mode, the Avaya G350 Media Gateway will use the Unicast EAPOL messages with the supplicants. Since most 802.1X supplicants use the Multicast MAC address for the EAPOL messages, the IP telephone must be configured to the pass-thru or p-t w/Logoff mode to pass-through these Multicast messages.
Page 10
Configure a username with a password in the users file under /usr/local/etc/raddb directory. For an IP telephone, configure the MAC address of the Avaya IP telephone as a username. For the mac-based mode, a username with a password should be configured for the attached PC.
Page 15
Status for the Connection information should be open and authenticated. If not, check Section 4 for troubleshooting. Note that the 802.1X supplicant software for the attached PC is not needed if the Avaya G350 Media Gateway is configured with the port-based mode.
Page 16
Idle Auth Use the command show cam <port#> to verify that the Avaya G350 Media Gateway learns the MAC addresses of the IP telephone and the attached PC in different VLANs. Note that the MAC address of the IP telephone is associated with the untagged VLAN and the static-VLAN.
Page 17
Authed Idle Auth Use the command show cam <port#> to verify that the Avaya G350 Media Gateway learns the MAC addresses of the IP telephone and the attached PC in different VLANs. G350-003(super)# show cam 6/1 Total Matching CAM Entries Displayed = 4...
Page 18
4.3 Troubleshooting 802.1X on the Avaya G350 Media Gateway 802.1X debugging can be enabled on the Avaya G350 Media Gateway for troubleshooting. Enter the following commands from the console port to enable 802.1X debugging. G350-003(super)# set logging session condition dot1x debug...
Page 19
If the IP telephone or the attached PC cannot be authenticated by the FreeRADIUS server, use the command radiusd –X to run the server in the debugging mode. The following shows a correct debugging output for the authentications of the Avaya IP telephone and the attached PC for the MAC-based mode.
802.1X supplicants using EAP-MD5. When the IP telephone is configured in the p-t w/Logoff mode and the Media Gateway port connected to the Avaya IP telephone in the MAC-based mode, the Avaya IP telephone and the attached PC can be authenticated individually.
Page 31
Application Notes. Please e-mail any questions or comments pertaining to these Application Notes along with the full title name and filename, located in the lower right corner, directly to the Avaya Solution & Interoperability Test Lab at interoplabnotes@list.avaya.com...
Need help?
Do you have a question about the G250 and is the answer not in the manual?
Questions and answers