Cisco Systems 2940 Switch User Manual


 
8-9
Catalyst 2940 Switch Software Configuration Guide
78-15507-02
Chapter 8 Configuring 802.1X Port-Based Authentication
Configuring 802.1X Authentication
global configuration command. If 802.1X was running in multiple-hosts mode on an interface in the
previous release, make sure to reconfigure it by using the dot1x host-mode multi-host interface
configuration command.
Enabling 802.1X Authentication
To enable 802.1X port-based authentication, you must enable AAA and specify the authentication
method list. A method list describes the sequence and authentication methods to be queried to
authenticate a user.
The software uses the first method listed to authenticate users; if that method fails to respond, the
software selects the next authentication method in the method list. This process continues until there is
successful communication with a listed authentication method or until all defined methods are
exhausted. If authentication fails at any point in this cycle, the authentication process stops, and no other
authentication methods are attempted.
Beginning in privileged EXEC mode, follow these steps to configure 802.1X port-based authentication.
This procedure is required.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
aaa new-model Enable AAA.
Step 3
aaa authentication dot1x {default}
method1 [method2...]
Create an 802.1X authentication method list.
To create a default list that is used when a named list is not specified in
the authentication command, use the default keyword followed by the
methods that are to be used in default situations. The default method list
is automatically applied to all interfaces.
Enter at least one of these keywords:
group radius—Use the list of all RADIUS servers for authentication.
none—Use no authentication. The client is automatically
authenticated by the switch without using the information supplied by
the client.
Step 4
dot1x system-auth-control Enable 802.1X authentication globally on the switch.
Step 5
aaa authorization network {default}
group radius
(Optional) Configure the switch for user RADIUS authorization for all
network-related service requests, such as per-user ACLs or VLAN
assignment.
Note To configure per-user ACLs, single-host mode must be enabled.
This setting is the default.
Step 6
interface interface-id Enter interface configuration mode, and specify the interface connected to
the client to be enabled for 802.1X authentication.
Step 7
dot1x port-control auto Enable 802.1X authentication on the interface.
For feature interaction information, see the “802.1X Configuration
Guidelines” section on page 8-8.
Step 8
end Return to privileged EXEC mode.