Configuring Internal Authentication Server Users
Beginning in Privileged EXEC mode, use the following commands to add
users to the IAS database and to use the database for 802.1X authentication.
Command
configure
aaa ias-user username
user
password
password
[encrypted]
CTRL + Z
show aaa ias-users
clear aaa ias-users
IEEE 802.1X Configuration Examples
This section contains the following examples:
•
Configuring 802.1X Authentication
•
Controlling Authentication-Based VLAN Assignment
•
Allowing Dynamic VLAN Creation of RADIUS-Assigned VLANs
•
Configuring Authentication Server DiffServ Filter Assignments
Configuring 802.1X Authentication
The network in this example requires clients to use 802.1X authentication to
access the network through the switch ports. The administrator must
configure the following settings on systems other than the switch before
configuring the switch:
1 Add the users to the client database on the Authentication Server, such as
a RADIUS server with Cisco
software.
2 Configure the settings on the client, such a PC running Microsoft
Windows, to require 802.1X authentication.
Purpose
Enter Global Configuration mode.
Add a user to the IAS user database. This command also
changes the mode to the AAA User Config mode.
Configure the password associated with the user.
Exit to Privileged EXEC mode.
View all configured IAS users.
Delete all IAS users from the database.
®
Secure Access Control Server (ACS)
Configuring Port and System Security
®
525