Configuring 802.1X Accounting - Cisco 2950 - Catalyst Switch Configuration Manual

Software configuration guide
Hide thumbs Also See for 2950 - Catalyst Switch:
Table of Contents

Advertisement

Configuring 802.1x Authentication
Command
Step 3
aaa authentication dot1x {default}
method1 [method2...]
Step 4
dot1x system-auth-control
Step 5
aaa authorization network {default}
group radius
Step 6
interface interface-id
Step 7
dot1x port-control auto
Step 8
end
Step 9
show dot1x
Step 10
copy running-config startup-config

Configuring 802.1x Accounting

Enabling AAA system accounting with 802.1x accounting allows system reload events to be sent to the
accounting RADIUS server for logging. The server can then infer that all active 802.1x sessions are
closed.
Because RADIUS uses the unreliable UDP transport protocol, accounting messages might be lost due to
poor network conditions. If the switch does not receive the accounting response message from the
RADIUS server after a configurable number of retransmissions of an accounting request, this system
message appears:
Accounting message %s for session %s failed to receive Accounting Response.
When the stop message is not sent successfully, this message appears:
00:09:55: %RADIUS-3-NOACCOUNTINGRESPONSE: Accounting message Start for session
172.20.50.145 sam 11/06/03 07:01:16 11000002 failed to receive Accounting Response.
Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide
10-20
Chapter 10
Purpose
Create an 802.1x authentication method list.
To create a default list that is used when a named list is not specified in
the authentication command, use the default keyword followed by the
methods that are to be used in default situations. The default method list
is automatically applied to all ports.
Enter at least one of these keywords:
group radius—Use the list of all RADIUS servers for authentication.
none—Use no authentication. The client is automatically
authenticated by the switch without using the information supplied by
the client.
Enable 802.1x authentication globally on the switch.
(Optional) Configure the switch for user RADIUS authorization for all
network-related service requests, such as per-user ACLs or VLAN
assignment.
Note
For per-user ACLs, single-host mode must be configured. This
setting is the default.
Specify the port connected to the client that is to be enabled for 802.1x
authentication, and enter interface configuration mode.
Enable 802.1x authentication on the port.
For feature interaction information, see the
Guidelines" section on page
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Configuring 802.1x Port-Based Authentication
"802.1x Configuration
10-10.
78-11380-10

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 2955

Table of Contents