Default 802.1X Port-Based Authentication Configuration - Cisco 6500 Series Software Configuration Manual

Hide thumbs Also See for 6500 Series:
Table of Contents

Advertisement

Chapter 25
Configuring IEEE 802.1X Port-Based Authentication
In a point-to-point configuration (see
802.1X-enabled switch port. The switch detects the client when the port link state changes to the up state.
If a client leaves or is replaced with another client, the switch changes the port link state to down, and
the port returns to the unauthorized state.
Figure 25-3
as a multiple-host port that becomes authorized as soon as one client is authenticated. When the port is
authorized, all other hosts indirectly attached to the port are granted access to the network. If the port
becomes unauthorized (reauthentication fails or an EAPOL-logoff message is received), the switch
denies access to the network to all of the attached clients. In this topology, the wireless access point is
responsible for authenticating the clients attached to it, and the wireless access point acts as a client to
the switch.
Figure 25-3 Wireless LAN Example
Wireless clients

Default 802.1X Port-Based Authentication Configuration

Table 25-1
Table 25-1 Default 802.1X Configuration
Feature
Authentication, authorization, and
accounting (AAA)
RADIUS server IP address
RADIUS server UDP authentication port
RADIUS server key
Per-interface 802.1X protocol enable state
Periodic reauthentication
Number of seconds between
reauthentication attempts
Quiet period
78-14099-04
Figure 25-1 on page
shows 802.1X port-based authentication in a wireless LAN. The 802.1X port is configured
Access point
shows the default 802.1X configuration.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
Default 802.1X Port-Based Authentication Configuration
25-2), only one client can be connected to the
Authentication
Catalyst switch
server
or
(RADIUS)
Cisco Router
Default Setting
Disabled
None specified
1812
None specified
Disabled (force-authorized)
The port transmits and receives normal traffic
Note
without 802.1X-based authentication of the
client.
Disabled
3600 seconds
60 seconds (number of seconds that the switch remains in
the quiet state following a failed authentication exchange
with the client)
25-5

Advertisement

Table of Contents
loading

Table of Contents