Radius Server
Radius Server
Radius Server
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
iii
Contents
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
iv
Contents
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
v
Contents
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
vi
Contents
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
vii
Contents
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
viii
Contents
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
ix
Contents
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
x
CHAPTER 1
Configuring IEEE 802.1X Port-Based
Authentication
IEEE 802.1X port-based authentication is configured on a device to prevent unauthorized devices (supplicants)
from gaining access to the network. The device can combine the function of a router, switch, and access
point, depending on the fixed configuration or installed modules. The switch functions are provided by either
built-in switch ports or a plug-in module with switch ports. This feature supports both access ports and trunk
ports.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
1
Configuring IEEE 802.1X Port-Based Authentication
Prerequisites for Configuring IEEE 802.1X Port-Based Authentication
The IEEE 802.1X Port-Based Authentication feature is available only on Cisco 89x and 88x series integrated
switching routers (ISRs) that support switch ports.
Note Optimal performance is obtained with a connection that has a maximum of eight hosts per port.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
2
Configuring IEEE 802.1X Port-Based Authentication
Restrictions for IEEE 802.1X Port-Based Authentication
Note Not all Cisco ISR routers support all the components listed. For information about module compatibility
with a specific router platform, see Cisco EtherSwitch Modules Comparison.
To determine whether your router has switch ports that can be configured with the IEEE 802.1X Port-Based
Authentication feature, use the show interfaces switchport command.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
3
Configuring IEEE 802.1X Port-Based Authentication
IEEE 802.1X Port-Based Authentication Configuration Restrictions
Note Ethernet interfaces can be configured either as access ports or as trunk ports with the
following specifications:
• An access port can have only one VLAN configured on the interface; it can carry
traffic for only one VLAN.
• A trunk port can have two or more VLANs configured on the interface; it can
carry traffic for several VLANs simultaneously.
• The IEEE 802.1X protocol is not supported on the following port types:
◦Dynamic-access ports—If you try to enable IEEE 802.1X authentication on a dynamic-access
(VLAN Query Protocol [VQP]) port, an error message appears, and IEEE 802.1X authentication
is not enabled. If you try to change an IEEE 802.1X-enabled port to dynamic VLAN assignment,
an error message appears, and the VLAN configuration is not changed.
◦Dynamic ports—If you try to enable IEEE 802.1X authentication on a dynamic port, an error
message appears, and IEEE 802.1X authentication is not enabled. If you try to change the mode
of an IEEE 802.1X-enabled port to dynamic, an error message appears, and the port mode is not
changed.
◦Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) destination ports—You can enable
IEEE 802.1X authentication on a port that is a SPAN or RSPAN destination port. However, IEEE
802.1X authentication is disabled until the port is removed as a SPAN or RSPAN destination port.
You can enable IEEE 802.1X authentication on a SPAN or RSPAN source port.
Note A port in dynamic mode can negotiate with its neighbor to become a trunk port.
• Configuring the same VLAN ID for both access and voice traffic (using the switchport access vlan
vlan-id and the switchport voice vlan vlan-id commands) fails if authentication has already been
configured on the port.
• Configuring authentication on a port on which you have already configured switchport access vlan
vlan-id and switchport voice vlan vlan-id fails if the access VLAN and voice VLAN have been configured
with the same VLAN ID.
• By default, authentication system messages, MAC authentication by-pass system messages and 802.1x
system messages are not displayed. If you need to see these system messages, turn on the logging
manually, using the following commands:
• authentication logging verbose
• dot1x logging verbose
• mab logging verbose
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
4
Configuring IEEE 802.1X Port-Based Authentication
Upgrading from a Previous Software Release
Note To ensure that information about any IEEE 802.1x-related commands that is entered on a port is
automaticallly added to the running configuration to address any backward compatibility issues, use the
dot1x pae authenticator command.
• Supplicant—Device (workstation) that requests access to the LAN and switch services and responds to
requests from the router. The workstation must be running IEEE 802.1X-compliant client software such
as that offered in the Microsoft Windows XP operating system. (The supplicant is sometimes called
the client.)
Note To resolve Windows XP network connectivity and IEEE 802.1X authentication issues,
read the Microsoft Knowledge Base article at this URL: http://support.microsoft.com/
kb/q303597/.
• Authentication server—Device that performs the actual authentication of the supplicant. The authentication
server validates the identity of the supplicant and notifies the router whether or not the supplicant is
authorized to access the LAN and switch services. The Network Access Device (or ISR router in this
instance) transparently passes the authentication messages between the supplicant and the authentication
server, and the authentication process is carried out between the supplicant and the authentication server.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
5
Configuring IEEE 802.1X Port-Based Authentication
IEEE 802.1X Authentication Initiation and Message Exchange
The particular EAP method used will be decided between the supplicant and the authentication server
(RADIUS server). The RADIUS security system with EAP extensions is available in Cisco Secure
Access Control Server Version 3.0 or later. RADIUS operates in a client and server model in which
secure authentication information is exchanged between the RADIUS server and one or more RADIUS
clients.
• Authenticator (integrated services router (ISR) or wireless access point)—Router that controls the
physical access to the network based on the authentication status of the supplicant. The router acts as
an intermediary between the supplicant and the authentication server, requesting identity information
from the supplicant, verifying that information with the authentication server, and relaying a response
to the supplicant. The router includes the RADIUS client, which is responsible for encapsulating and
decapsulating the EAP frames and interacting with the authentication server.
When the authenticator receives EAPOL frames and relays them to the authentication server, the EAPOL is
stripped and the remaining EAP frame is reencapsulated in the RADIUS format. The EAP frames are not
modified during encapsulation, and the authentication server must support EAP within the native frame format.
When the authenticator receives frames from the authentication server, the server’s frame header is removed,
leaving the EAP frame, which is then encapsulated for Ethernet and sent to the client.
Note Effective with Cisco IOS Release 12.2(33)SXI, the authentication port-control command replaces the
dot1xport-control command.
However, if during bootup the supplicant does not receive an EAP-request/identity frame from the router, the
supplicant can initiate authentication by sending an EAPOL-start frame, which prompts the router to request
the supplicant’s identity.
Note If IEEE 802.1X authentication is not enabled or supported on the network access device, any EAPOL
frames from the supplicant are dropped. If the supplicant does not receive an EAP-request/identity frame
after three attempts to start authentication, the supplicant sends frames as if the port is in the authorized
state. A port in the authorized state effectively means that the supplicant has been successfully authenticated.
For more information, see the Ports in Authorized and Unauthorized States module.
When the supplicant supplies its identity, the router begins its role as the intermediary, passing EAP frames
between the supplicant and the authentication server until authentication succeeds or fails. If the authentication
succeeds, the router port becomes authorized. If the authentication fails, authentication can be retried, the port
might be assigned to a VLAN that provides limited services, or network access is not granted. For more
information, see the Ports in Authorized and Unauthorized States module.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
6
Configuring IEEE 802.1X Port-Based Authentication
IEEE 802.1X Authentication Process
The specific exchange of EAP frames depends on the authentication method being used. The figure below
shows a message exchange initiated by the supplicant using the One-Time-Password (OTP) authentication
method with a RADIUS server.
You can configure the reauthentication timer to use a router-specific value or to be based on values from the
RADIUS server.
After IEEE 802.1X authentication using a RADIUS server is configured, the router uses timers based on the
Session-Timeout RADIUS attribute (Attribute [27]) and the Termination-Action RADIUS attribute (Attribute
[29]).
The Session-Timeout RADIUS attribute (Attribute [27]) specifies the time after which reauthentication occurs.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
7
Configuring IEEE 802.1X Port-Based Authentication
IEEE 802.1X Host Mode
The Termination-Action RADIUS attribute (Attribute [29]) specifies the action to take during reauthentication.
The actions can be Initialize or ReAuthenticate. When the Initialize action is set (the attribute value is
DEFAULT ), the IEEE 802.1x session ends, and connectivity is lost during reauthentication. When the
ReAuthenticate action is set (the attribute value is RADIUS-Request), the session is not affected during
reauthentication.
You manually reauthenticate the supplicant by entering the dot1x re-authenticate interface interface-name
interface-number privileged EXEC command.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
8
Configuring IEEE 802.1X Port-Based Authentication
IEEE 802.1X—Conditional Logging
When a supplicant logs off, it sends an EAPOL-logoff message, causing the router port to change to the
unauthorized state.
If the link state of a port changes from up to down, or if an EAPOL-logoff frame is received, the port returns
to the unauthorized state.
The Cisco-PAE-MIB provides SNMP support for the logging and reporting of events, including:
• Port mode
• Guest VLAN number (details the Guest VLAN number configured on a port)
• InGuestVLAN (indicates whether a port is in the Guest VLAN)
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
9
Configuring IEEE 802.1X Port-Based Authentication
How to Configure IEEE 802.1X Port-Based Authentication
1. enable
2. configure terminal
3. aaa new-model
4. aaa authentication dot1x {default | listname} method1 [method2...]
5. dot1x system-auth-control
6. identity profile default
7. interface type slot/port
8. access-session port-control {auto | force-authorized | force-unauthorized}
9. dot1x pae [supplicant | authenticator | both]
10. end
11. show dot1x
DETAILED STEPS
Example:
Device# configure terminal
Example:
Device(config)# aaa new-model
Step 4 aaa authentication dot1x {default | Creates a series of authentication methods that are used to determine user
listname} method1 [method2...] privilege to access the privileged command level so that the device can
communicate with the AAA server.
Example:
Device(config)# aaa authentication
dot1x default group radius
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
10
Configuring IEEE 802.1X Port-Based Authentication
Enabling IEEE 802.1X Authentication and Authorization
Example:
Device(config)# dot1x
system-auth-control
Step 6 identity profile default Creates an identity profile and enters dot1x profile configuration mode.
Example:
Device(config)# identity profile
default
Step 7 interface type slot/port Enters interface configuration mode and specifies the interface to be enabled
for 802.1X authentication.
Example:
Device(config-identity-prof)#
interface Gigabitethernet 1/0/1
Step 8 access-session port-control {auto | Enables 802.1X port-based authentication on the interface.
force-authorized | force-unauthorized}
• auto—Enables IEEE 802.1X authentication and causes the port to
begin in the unauthorized state, allowing only EAPOL frames to be
Example: sent and received through the port. The authentication process begins
Device(config-if)# access-session
port-control auto when the link state of the port changes from down to up or when an
EAPOL-start frame is received. The Device requests the identity of
the supplicant and begins relaying authentication messages between
the supplicant and the authentication server. Each supplicant
attempting to access the network is uniquely identified by the Device
by using the supplicant MAC address.
• force-authorized-—Disables IEEE 802.1X authentication and causes
the port to change to the authorized state without any authentication
exchange required. The port sends and receives normal traffic without
IEEE 802.1X-based authentication of the client. This is the default
setting.
• force-unauthorized—Causes the port to remain in the unauthorized
state, ignoring all attempts by the supplicant to authenticate. The
Device cannot provide authentication services to the supplicant
through the port.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
11
Configuring IEEE 802.1X Port-Based Authentication
Configuring the IEEE 802.1X Host Mode
Step 10 end Exits interface configuration mode and enters privileged EXEC mode.
Example:
Device(config-if)# end
Step 11 show dot1x Displays whether 802.1X authentication has been configured on the device.
Example:
Device# show dot1x
Note This section describes IEEE 802.1X security features available only on the switch ports.
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server vsa send authentication
4. interface type number
5. access-session host-mode {multi-auth | multi-domain | multi-host | single-host} [open]
6. switchport voice vlan vlan-id
7. end
8. show authentication interface type number
9. copy running-config startup-config
DETAILED STEPS
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
12
Configuring IEEE 802.1X Port-Based Authentication
Configuring the IEEE 802.1X Host Mode
Example:
Device# configure terminal
Step 3 radius-server vsa send authentication Configures the Network Access Server (NAS) to recognize and
use vendor-specific attributes.
Example:
Device(config)# radius-server vsa send
authentication
Step 4 interface type number Specifies the port to which multiple hosts are indirectly attached,
and enters interface configuration mode.
Example:
Device(config)# interface Gigabitethernet
1/2/1
Step 5 access-session host-mode {multi-auth | Allows a single host (client) or multiple hosts on the
multi-domain | multi-host | single-host} [open] 802.1X-authorized port.
• The multi-auth keyword specifies multiple authentications
Example: to occur on the 802.1X-authorized port.
Device(config-if)# access-session host-mode
single-host Gigabitethernet 1/2/1
• The multi-domain keyword specifies multi-domain
authentication (MDA), which is used to enable authentication
of both a host and a voice device, such as an IP phone (Cisco
or non-Cisco) on the same switch port.
• The multi-host keyword specifies multiple hosts on the
802.1X-authorized port.
• The single-host keyword specifies a single client on the
802.1X-authorized port.
• (Optional) The open keyword specifies that the port is open;
that is, there are no access restrictions.
Step 6 switchport voice vlan vlan-id (Optional) Configures the voice VLAN.
Example:
Device(config-if)# switchport voice vlan 2
Step 7 end Exits interface configuration mode and returns to privileged EXEC
mode.
Example:
Device(config-if)# end
Example:
Device# show authentication interface
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
13
Configuring IEEE 802.1X Port-Based Authentication
Enabling IEEE 802.1X SNMP Notifications on Switch Ports
Example:
Device# copy running-config startup-config
1. enable
2. configure terminal
3. snmp-server enable traps dot1x notification-type
DETAILED STEPS
Example:
Device# configure terminal
Step 3 snmp-server enable traps dot1x notification-type Enables SNMP logging and reporting when no Guest
VLAN is configured or available.
Example:
Device(config)# snmp-server enable traps dot1x
no-guest-vlan
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
14
Configuring IEEE 802.1X Port-Based Authentication
Configuration Examples for IEEE 802.1x Port-Based Authentication
Note Effective with Cisco IOS Release 12.2(33)SXI, the authentication port-control command replaces the
dot1xport-control command.
Note Whenever you configure any IEEE 802.1X parameter on a port, a dot1x authenticator is automatically
created on the port. As a result, the dot1x pae authenticator command appears in the configuration to
ensure that IEEE 802.1X authentication still works without manual intervention on legacy configurations.
The appearance of the IEEE 802.1X information in the configuration is likely to change in future releases.
The following example shows how to enable IEEE 802.1X and AAA on Fast Ethernet port 2/1 and how to
verify the configuration:
Note In this example the Ethernet interface is configured as an access port by using the switchport mode access
command in interface configuration mode. The Ethernet interface can also be configured as a trunk port
using the switchport mode trunk command in interface configuration mode.
Device> enable
Device# configure terminal
Device(config)# dot1x system-auth-control
Device(config)# aaa new-model
Device(config)# aaa authentication dot1x default group radius
Device(config)# interface fastethernet2/1
Device(config-if)# switchport mode access
Device(config-if)# authentication port-control auto
Device(config-if)# dot1x pae authenticator
Device(config-if)# end
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
15
Configuring IEEE 802.1X Port-Based Authentication
Example: Configuring the IEEE 802.1X Host Mode
Supplicant = 1000.0000.2e00
Auth SM State = AUTHENTICATED
Auth BEND SM Stat = IDLE
Port Status = AUTHORIZED
Device> enable
Device# configure terminal
Device(config)# interface gigabitethernet 2/0/1
Device(config-if)# authentication port-control auto
Device(config-if)# authentication host-mode multihost
Device(config-if)# end
Sysauthcontrol Enabled
Dot1x Protocol Version 2
Dot1x Info for FastEthernet1
-----------------------------------
PAE = AUTHENTICATOR
PortControl = AUTO
ControlDirection = Both
HostMode = MULTI_HOST
ReAuthentication = Disabled
QuietPeriod = 60
ServerTimeout = 30
SuppTimeout = 30
ReAuthPeriod = 3600 (Locally configured)
ReAuthMax = 2
MaxReq = 2
TxPeriod = 30
RateLimitPeriod = 0
Device-871#
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
16
Configuring IEEE 802.1X Port-Based Authentication
Additional References for IEEE 802.1X Port-Based Authentication
AdditionalReferencesforIEEE802.1XPort-BasedAuthentication
Related Documents
Security commands
• Cisco IOS Security Command Reference:
Commands A to C
• Cisco IOS Security Command Reference:
Commands D to L
• Cisco IOS Security Command Reference:
Commands M to R
• Cisco IOS Security Command Reference:
Commands S to Z
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
MIBs
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
17
Configuring IEEE 802.1X Port-Based Authentication
Feature Information for IEEE 802.1X Port-Based Authentication
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
18
Configuring IEEE 802.1X Port-Based Authentication
Feature Information for IEEE 802.1X Port-Based Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
19
Configuring IEEE 802.1X Port-Based Authentication
Feature Information for IEEE 802.1X Port-Based Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
20
Configuring IEEE 802.1X Port-Based Authentication
Feature Information for IEEE 802.1X Port-Based Authentication
IEEE 802.1X Support for Trunk Cisco IOS XE 3.2SE The IEEE 802.1X Support for
Ports Trunk Ports feature is used to
Cisco IOS XE 3.3SE
configure Ethernet interfaces as
trunk ports.
In Cisco IOS XE Release 3.2SE,
this feature was supported on the
following platforms:
• Catalyst 3850 Series
Switches
• Cisco 5760 Wireless LAN
Controller
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
21
Configuring IEEE 802.1X Port-Based Authentication
Feature Information for IEEE 802.1X Port-Based Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
22
CHAPTER 2
IEEE 802.1X Common Session ID
The IEEE 802.1X Common Session ID feature allows a single session identifier to be used for all 802.1X
and MAB authenticated sessions. This session ID is used for all reporting purposes such as show commands,
MIBs, and RADIUS messages and allows users to distinguish messages for one session from messages for
other sessions.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
23
IEEE 802.1X Common Session ID
Prerequisites for IEEE 802.1X Common Session ID
• The device must have a RADIUS configuration and be connected to the Cisco secure access control
server (ACS). You should understand the concepts of the RADIUS protocol and have an understanding
of how to create and apply access control lists (ACLs).
• EAP support must be enabled on the RADIUS server.
• You must configure the IEEE 802.1X supplicant to send an EAP-logoff (Stop) message to the switch
when the user logs off. If you do not configure the IEEE 802.1X supplicant, an EAP-logoff message is
not sent to the switch and the accompanying accounting Stop message is not sent to the authentication
server. See the Microsoft Knowledge Base article at the location http://support.microsoft.com and set
the SupplicantMode registry to 3 and the AuthMode registry to 1.
• Authentication, authorization, and accounting (AAA) must be configured on the port for all
network-related service requests. The authentication method list must be enabled and specified. A method
list describes the sequence and authentication method to be queried to authenticate a user. See the IEEE
802.1X Authenticator feature module for information.
• The port must be successfully authenticated.
The IEEE 802.1X Common Session ID feature is available only on Cisco 89x and 88x series integrated
switching routers (ISRs) that support switch ports.
The following ISR-G2 routers are supported:
• 1900
• 2900
• 3900
• 3900e
Note Not all Cisco ISR routers support all the components listed. For information about module compatibility
with a specific router platform, see Cisco EtherSwitch Modules Comparison.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
24
IEEE 802.1X Common Session ID
Restrictions for IEEE 802.1X Common Session ID
To determine whether your router has switch ports, use the show interfaces switchport command.
The session ID is used by the NAD, the AAA server, and other report-analyzing applications to identify the
client. The ID appears automatically. No configuration is required.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
25
IEEE 802.1X Common Session ID
Additional References for IEEE 802.1X Port-Based Authentication
AdditionalReferencesforIEEE802.1XPort-BasedAuthentication
Related Documents
Security commands
• Cisco IOS Security Command Reference:
Commands A to C
• Cisco IOS Security Command Reference:
Commands D to L
• Cisco IOS Security Command Reference:
Commands M to R
• Cisco IOS Security Command Reference:
Commands S to Z
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
MIBs
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
26
IEEE 802.1X Common Session ID
Feature Information for IEEE 802.1X Common Session ID
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
27
IEEE 802.1X Common Session ID
Feature Information for IEEE 802.1X Common Session ID
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
28
CHAPTER 3
IEEE 802.1X Guest VLAN
The IEEE 802.1X Guest VLAN feature allows a guest VLAN to be configured for each 802.1X port on the
device to provide limited services to non-802.1X-compliant clients.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
29
IEEE 802.1X Guest VLAN
Prerequisites for IEEE 802.1X Guest VLAN
The IEEE 802.1X Guest VLAN Support feature is available only on Cisco 89x and 88x series integrated
switching routers (ISRs) that support switch ports.
The following ISR-G2 routers are supported:
• 1900
• 2900
• 3900
• 3900e
Note Not all Cisco ISR routers support all the components listed. For information about module compatibility
with a specific router platform, see Cisco EtherSwitch Modules Comparison.
To determine whether your router has switch ports, use the show interfaces switchport command.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
30
IEEE 802.1X Guest VLAN
Restrictions for IEEE 802.1X Guest VLAN
Note If an EAPOL packet is detected after the interface has changed to the guest VLAN, the interface reverts
to an unauthorized state, and IEEE 802.1X authentication restarts.
Any number of IEEE 802.1X-incapable clients are allowed access when the router port is moved to the guest
VLAN. If an IEEE 802.1X-capable client joins the same port on which the guest VLAN is configured, the
port is put into the unauthorized state in the user-configured access VLAN, and authentication is restarted.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
31
IEEE 802.1X Guest VLAN
How to Configure IEEE 802.1X Guest VLAN
Note Guest VLANs are supported on IEEE 802.1X ports in single-host or multihost mode.
Note To disable and remove the guest VLAN, use the no dot1x guest-vlan in interface configuration mode.
The port returns to the unauthorized state.
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. authentication port-control auto
4. exit
5. dot1x guest-vlan supplicant
6. end
7. show authentication interface interface-id
8. copy running-config startup-config
DETAILED STEPS
Example:
Switch# configure terminal
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
32
IEEE 802.1X Guest VLAN
Configuring IEEE 802.1X Guest VLAN
Example:
Switch(config-if)# authentication port-control
auto
Step 5 dot1x guest-vlan supplicant Specifies the supplicant as an 802.1X guest VLAN.
• You can configure any active VLAN except an RSPAN
Example: VLAN or a voice VLAN as an 802.1X guest VLAN.
Switch(config)# dot1x guest-vlan supplicant
Example:
Switch(config-if)# end
Example:
Switch# show authentication interface
gigabitethernet0/1
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Switch# copy running-config startup-config
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
33
IEEE 802.1X Guest VLAN
Configuration Examples for IEEE 802.1X Guest VLAN
AdditionalReferencesforIEEE802.1XPort-BasedAuthentication
Related Documents
Security commands
• Cisco IOS Security Command Reference:
Commands A to C
• Cisco IOS Security Command Reference:
Commands D to L
• Cisco IOS Security Command Reference:
Commands M to R
• Cisco IOS Security Command Reference:
Commands S to Z
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
34
IEEE 802.1X Guest VLAN
Feature Information for IEEE 802.1X Guest VLAN
MIBs
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
35
IEEE 802.1X Guest VLAN
Feature Information for IEEE 802.1X Guest VLAN
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
36
CHAPTER 4
IEEE 802.1X RADIUS Accounting
The IEEE 802.1X RADIUS Accounting feature is used to relay important events to the RADIUS server
(such as the supplicant's connection session). The information in these events is used for security and billing
purposes.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
37
IEEE 802.1X RADIUS Accounting
Prerequisites for Configuring IEEE 802.1X RADIUS Accounting
• The device must have a RADIUS configuration and be connected to the Cisco secure access control
server (ACS). You should understand the concepts of the RADIUS protocol and have an understanding
of how to create and apply access control lists (ACLs).
• EAP support must be enabled on the RADIUS server.
• You must configure the IEEE 802.1X supplicant to send an EAP-logoff (Stop) message to the switch
when the user logs off. If you do not configure the IEEE 802.1X supplicant, an EAP-logoff message is
not sent to the switch and the accompanying accounting Stop message is not sent to the authentication
server. See the Microsoft Knowledge Base article at the location http://support.microsoft.com and set
the SupplicantMode registry to 3 and the AuthMode registry to 1.
• Authentication, authorization, and accounting (AAA) must be configured on the port for all
network-related service requests. The authentication method list must be enabled and specified. A method
list describes the sequence and authentication method to be queried to authenticate a user. See the IEEE
802.1X Authenticator feature module for information.
• The port must be successfully authenticated.
• If you plan to implement system-wide accounting, you should also configure IEEE 802.1X accounting.
You also need to inform the accounting server of the system reload event when the system is reloaded
to ensure that the accounting server is aware that all outstanding IEEE 802.1X sessions on this system
are closed.
The RADIUS Accounting feature is available only on Cisco 89x and 88x series integrated switching routers
(ISRs) that support switch ports.
The following ISR-G2 routers are supported:
• 1900
• 2900
• 3900
• 3900e
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
38
IEEE 802.1X RADIUS Accounting
Restrictions for IEEE 802.1X with RADIUS Accounting
Note Not all Cisco ISR routers support all the components listed. For information about module compatibility
with a specific router platform, see Cisco EtherSwitch Modules Comparison.
To determine whether your router has switch ports that can be configured with the IEEE 802.1X port-based
authentication feature, use the show interfaces switchport command.
When the port state transitions between authorized and unauthorized, the RADIUS messages are transmitted
to the RADIUS server.
The switch does not log any accounting information. Instead, it sends such information to the RADIUS server,
which must be configured to log accounting messages.
The following is the IEEE 802.1X RADIUS accounting process:
1 A user connects to a port on the router.
2 Authentication is performed.
3 VLAN assignment is enabled, as appropriate, based on the RADIUS server configuration.
4 The router sends a start message to an accounting server.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
39
IEEE 802.1X RADIUS Accounting
IEEE 802.1X Accounting Attribute-Value Pairs
The switch port does not log IEEE 802.1X accounting information. Instead, it sends this information to the
RADIUS server, which must be configured to log accounting messages.
To configure IEEE 802.1X accounting, you need to perform the following tasks:
Note See the “Enabling 802.1X Accounting" section for more specific configuration information.
Enabling AAA system accounting along with IEEE 802.1X accounting allows system reload events to be sent
to the accounting RADIUS server for logging. When the accounting RADIUS server receives notice of a
system reload event, the server can infer that all active IEEE 802.1X sessions are appropriately closed.
Because RADIUS uses the unreliable transport protocol UDP, accounting messages may be lost due to poor
network conditions. If the switch does not receive the accounting response message from the RADIUS server
after a configurable number of retransmissions of an accounting request, the following system message appears:
Note Use the debug radius command or debug radius accounting command to enable the %RADIUS-3-NO
ACCOUNTING RESPONSE message.
Use the show radius statistics command to display the number of RADIUS messages that do not receive the
accounting response message.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
40
IEEE 802.1X RADIUS Accounting
IEEE 802.1X Accounting Attribute-Value Pairs
The following table lists the AV pairs and when they are sent by the router.
Note The Framed-IP-Address AV pair (Attribute 8) is sent only if a valid Dynamic Host Control Protocol
(DHCP) binding exists for the host in the DHCP snooping bindings table.
Note With CSCtz66183, the Service-Type AV pair (Attribute 6) is not displayed in the Accounting-Request
records.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
41
IEEE 802.1X RADIUS Accounting
IEEE 802.1X Accounting Attribute-Value Pairs
You can configure the device to send Cisco vendor-specific attributes (VSAs) to the RADIUS server. The
following table lists the available Cisco AV pairs.
Note Before VSAs can be sent in the accounting records you must configure the radius-server vsa send
accounting command.
You can display the AV pairs that are being sent by the router by entering the debug radius accounting
privileged EXEC command. For more information about this command, see the Cisco IOS Debug Command
Reference. For more information about AV pairs, see Cisco IOS RFC 3580, IEEE 802.1X Remote Authentication
Dial In User Service (RADIUS) Usage Guidelines.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
42
IEEE 802.1X RADIUS Accounting
How to Use IEEE 802.1X RADIUS Accounting
1. enable
2. configure terminal
3. aaa new-model
4. radius-server host {hostname | ip-address} auth-port port-number acct-port port-number
5. aaa accounting dot1x default start-stop group radius
6. aaa accounting system default start-stop group radius
7. end
DETAILED STEPS
Example:
Device# configure terminal
Example:
Device(config)# aaa new-model
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
43
IEEE 802.1X RADIUS Accounting
Configuration Example for IEEE 802.1X RADIUS Accounting
Step 6 aaa accounting system default start-stop Performs accounting for all system-level events not associated with users,
group radius such as reloads.
Note When system accounting is used and the accounting server is
Example: unreachable at system startup time, the system will not be accessible
| for approximately two minutes.
Device(config)# aaa accounting system
default start-stop group radius • The start-stop keyword sends a "start" accounting notice at the
beginning of a process and a "stop" accounting notice at the end of a
process. The "start" accounting record is sent in the background. The
requested user process begins regardless of whether the "start"
accounting notice was received by the accounting server.
• The group radius is the exact name of the character string used to
name the list of all RADIUS servers for authentication as defined by
the aaa group server radius command.
Step 7 end Exits global configuration mode and enters privileged EXEC mode.
Example:
Device(config)# end
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
44
IEEE 802.1X RADIUS Accounting
Additional References for IEEE 802.1X Port-Based Authentication
Note You must configure the RADIUS server to perform accounting tasks.
AdditionalReferencesforIEEE802.1XPort-BasedAuthentication
Related Documents
Security commands
• Cisco IOS Security Command Reference:
Commands A to C
• Cisco IOS Security Command Reference:
Commands D to L
• Cisco IOS Security Command Reference:
Commands M to R
• Cisco IOS Security Command Reference:
Commands S to Z
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
45
IEEE 802.1X RADIUS Accounting
Feature Information for IEEE 802.1X RADIUS Accounting
MIBs
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
46
IEEE 802.1X RADIUS Accounting
Feature Information for IEEE 802.1X RADIUS Accounting
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
47
IEEE 802.1X RADIUS Accounting
Feature Information for IEEE 802.1X RADIUS Accounting
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
48
CHAPTER 5
IEEE 802.1X Voice VLAN
The IEEE 802.1X Voice VLAN feature allows you to configure a special access port associated with two
VLAN identifiers. One identifier carries voice traffic to and from the IP phone. The other identifier carries
data traffic to and from the workstation connected to the router through the IP phone.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
49
IEEE 802.1X Voice VLAN
Prerequisites for IEEE 802.1X Voice VLAN
• The device must have a RADIUS configuration and be connected to the Cisco secure access control
server (ACS). You should understand the concepts of the RADIUS protocol and have an understanding
of how to create and apply access control lists (ACLs).
• EAP support must be enabled on the RADIUS server.
• You must configure the IEEE 802.1X supplicant to send an EAP-logoff (Stop) message to the switch
when the user logs off. If you do not configure the IEEE 802.1X supplicant, an EAP-logoff message is
not sent to the switch and the accompanying accounting Stop message is not sent to the authentication
server. See the Microsoft Knowledge Base article at the location http://support.microsoft.com and set
the SupplicantMode registry to 3 and the AuthMode registry to 1.
• Authentication, authorization, and accounting (AAA) must be configured on the port for all
network-related service requests. The authentication method list must be enabled and specified. A method
list describes the sequence and authentication method to be queried to authenticate a user. See the IEEE
802.1X Authenticator feature module for information.
• The port must be successfully authenticated.
The IEEE 802.1X Voice VLAN feature is available only on Cisco 89x and 88x series integrated switching
routers (ISRs) that support switch ports.
The following ISR-G2 routers are supported:
• 1900
• 2900
• 3900
• 3900e
Note Not all Cisco ISR routers support all the components listed. For information about module compatibility
with a specific router platform, see Cisco EtherSwitch Modules Comparison.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
50
IEEE 802.1X Voice VLAN
Restrictions for IEEE 802.1X Voice VLAN
To determine whether your router has switch ports, use the show interfaces switchport command.
Note A port in dynamic mode can negotiate with its neighbor to become a trunk port.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
51
IEEE 802.1X Voice VLAN
Information About IEEE 802.1X Voice VLAN
The IP phone uses the VVID for its voice traffic, regardless of the authorization state of the port. This allows
the phone to work independently of IEEE 802.1X authentication.
In single-host mode, only the IP phone is allowed on the voice VLAN. In multihost mode, additional supplicants
can send traffic on the voice VLAN after a supplicant is authenticated on the PVID. When multihost mode is
enabled, the supplicant authentication affects both the PVID and the VVID.
A voice VLAN port becomes active when there is a link, and the device MAC address appears after the first
Cisco Discovery Protocol message from the IP phone. Cisco IP phones do not relay Cisco Discovery Protocol
messages from other devices. As a result, if several IP phones are connected in series, the router recognizes
only the one directly connected to it. When IEEE 802.1X authentication is enabled on a voice VLAN port,
the router drops packets from unrecognized IP phones more than one hop away.
When IEEE 802.1X authentication is enabled on a port, you cannot configure a port VLAN that is equal to a
voice VLAN.
Note If you enable IEEE 802.1X authentication on an access port on which a voice VLAN is configured and
to which a Cisco IP Phone is connected, the Cisco IP phone loses connectivity to the router for up to 30
seconds.
Note See your Cisco switch software configuration guide for additional Voice VLAN information.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
52
IEEE 802.1X Voice VLAN
How to Configure IEEE 802.1X Voice VLAN
1. enable
2. configure terminal
3. mls qos
4. interface interface-id
5. mls qos trust cos
6. switchport voice {detect cisco-phone [full-duplex] | vlan {vlan-id | dot1p | none | untagged}}
7. end
8. show interfaces interface-id switchport
DETAILED STEPS
Example:
Device# configure terminal
Example:
Device(config)# mls qos
Step 4 interface interface-id Specify the interface connected to the phone, and enter interface
configuration mode.
Example:
Device(config)# interface
Gigabitethernet 1/0/1
Step 5 mls qos trust cos Configure the interface to classify incoming traffic packets by using the
packet CoS value. For untagged packets, the port default CoS value is
Example: used.
Device(config-if)# mls qos trust cos
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
53
IEEE 802.1X Voice VLAN
Configuring an IEEE 802.1X Voice VLAN
Example:
Device(config-if)# end
Step 8 show interfaces interface-id switchport Verify your QoS and voice VLAN entries.
Example:
Device# show interfaces
Gigabitethernet 1/0/1 switchport
What to Do Next
Note See your Cisco switch software configuration guide for additional Voice VLAN configuration information.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
54
IEEE 802.1X Voice VLAN
Configuration Example for IEEE 802.1X Voice VLAN
AdditionalReferencesforIEEE802.1XPort-BasedAuthentication
Related Documents
Security commands
• Cisco IOS Security Command Reference:
Commands A to C
• Cisco IOS Security Command Reference:
Commands D to L
• Cisco IOS Security Command Reference:
Commands M to R
• Cisco IOS Security Command Reference:
Commands S to Z
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
55
IEEE 802.1X Voice VLAN
Feature Information for IEEE 802.1X Voice VLAN
MIBs
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
56
IEEE 802.1X Voice VLAN
Feature Information for IEEE 802.1X Voice VLAN
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
57
IEEE 802.1X Voice VLAN
Feature Information for IEEE 802.1X Voice VLAN
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
58
CHAPTER 6
IEEE 802.1X VLAN Assignment
The IEEE 802.1X VLAN Assignment feature is automatically enabled when IEEE 802.1X authentication
is configured for an access port, which allows the RADIUS server to send a VLAN assignment to the device
port. This assignment configures the device port so that network access can be limited for certain users.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
59
IEEE 802.1X VLAN Assignment
Prerequisites for IEEE 802.1X VLAN Assignment
• The device must have a RADIUS configuration and be connected to the Cisco secure access control
server (ACS). You should understand the concepts of the RADIUS protocol and have an understanding
of how to create and apply access control lists (ACLs).
• EAP support must be enabled on the RADIUS server.
• You must configure the IEEE 802.1X supplicant to send an EAP-logoff (Stop) message to the switch
when the user logs off. If you do not configure the IEEE 802.1X supplicant, an EAP-logoff message is
not sent to the switch and the accompanying accounting Stop message is not sent to the authentication
server. See the Microsoft Knowledge Base article at the location http://support.microsoft.com and set
the SupplicantMode registry to 3 and the AuthMode registry to 1.
• Authentication, authorization, and accounting (AAA) must be configured on the port for all
network-related service requests. The authentication method list must be enabled and specified. A method
list describes the sequence and authentication method to be queried to authenticate a user. See the IEEE
802.1X Authenticator feature module for information.
• The port must be successfully authenticated.
The IEEE 802.1X VLAN Assignment feature is available only on Cisco 89x and 88x series integrated switching
routers (ISRs) that support switch ports.
The following ISR-G2 routers are supported:
• 1900
• 2900
• 3900
• 3900e
Note Not all Cisco ISR routers support all the components listed. For information about module compatibility
with a specific router platform, see Cisco EtherSwitch Modules Comparison.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
60
IEEE 802.1X VLAN Assignment
Restrictions for IEEE 802.1X VLAN Assignment
To determine whether your router has switch ports, use the show interfaces switchport command.
Note An access VLAN is a VLAN assigned to an access port. All packets sent from or received on this port
belong to this VLAN.
• Assignment to the configured access VLAN prevents ports from appearing unexpectedly in an
inappropriate VLAN because of a configuration error. Examples of configuration errors include the
following:
• A nonexistent or malformed VLAN ID
• Attempted assignment to a voice VLAN ID
• When IEEE 802.1X authentication is enabled on a port, you cannot configure a port VLAN that is equal
to a voice VLAN.
• The IEEE 802.1X authentication with VLAN assignment feature is not supported on trunk ports, dynamic
ports, or with dynamic-access port assignment through a VLAN Membership Policy Server (VMPS).
• If the multihost mode is enabled on an IEEE 802.1X port, all hosts are placed in the same VLAN
(specified by the RADIUS server) as the first authenticated host.
• If an IEEE 802.1X port is authenticated and put in the RADIUS server-assigned VLAN, any change to
the port access VLAN configuration does not take effect.
• This feature does not support standard ACLs on the switch port.
Configuring Authorization
The AAA authorization feature is used to determine what a user can and cannot do. When AAA authorization
is enabled, the network access server uses information retrieved from the user’s profile, which is located either
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
61
IEEE 802.1X VLAN Assignment
IEEE 802.1X Authentication with VLAN Assignment
in the local user database or on the security server, to configure the user’s session. Once this is done, the user
is granted access to a requested service only if the information in the user profile allows it.
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa authorization network radius if-authenticated
5. aaa authorization exec radius if-authenticated
6. end
DETAILED STEPS
Example:
Device# configure terminal
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
62
IEEE 802.1X VLAN Assignment
Enabling IEEE 802.1X Authentication and Authorization
Example:
Device(config)# aaa new-model
Step 4 aaa authorization network radius if-authenticated Configures the device for user RADIUS authorization for all
network-related service requests. RADIUS authorization
Example: succeeds if the user has authenticated.
Step 5 aaa authorization exec radius if-authenticated Configures the device for user RADIUS authorization if the
user has privileged EXEC access. RADIUS authorization
Example: succeeds if the user has authenticated.
Step 6 end Exits global configuration mode and enters privileged EXEC
mode.
Example:
Device(config)# end
1. enable
2. configure terminal
3. aaa new-model
4. aaa authentication dot1x {default | listname} method1 [method2...]
5. dot1x system-auth-control
6. identity profile default
7. interface type slot/port
8. access-session port-control {auto | force-authorized | force-unauthorized}
9. dot1x pae [supplicant | authenticator | both]
10. end
11. show dot1x
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
63
IEEE 802.1X VLAN Assignment
Enabling IEEE 802.1X Authentication and Authorization
DETAILED STEPS
Example:
Device# configure terminal
Example:
Device(config)# aaa new-model
Step 4 aaa authentication dot1x {default | Creates a series of authentication methods that are used to determine user
listname} method1 [method2...] privilege to access the privileged command level so that the device can
communicate with the AAA server.
Example:
Device(config)# aaa authentication
dot1x default group radius
Example:
Device(config)# dot1x
system-auth-control
Step 6 identity profile default Creates an identity profile and enters dot1x profile configuration mode.
Example:
Device(config)# identity profile
default
Step 7 interface type slot/port Enters interface configuration mode and specifies the interface to be enabled
for 802.1X authentication.
Example:
Device(config-identity-prof)#
interface Gigabitethernet 1/0/1
Step 8 access-session port-control {auto | Enables 802.1X port-based authentication on the interface.
force-authorized | force-unauthorized}
• auto—Enables IEEE 802.1X authentication and causes the port to
begin in the unauthorized state, allowing only EAPOL frames to be
Example: sent and received through the port. The authentication process begins
Device(config-if)# access-session
port-control auto when the link state of the port changes from down to up or when an
EAPOL-start frame is received. The Device requests the identity of
the supplicant and begins relaying authentication messages between
the supplicant and the authentication server. Each supplicant
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
64
IEEE 802.1X VLAN Assignment
Specifying an Authorized VLAN in the RADIUS Server Database
Step 10 end Exits interface configuration mode and enters privileged EXEC mode.
Example:
Device(config-if)# end
Step 11 show dot1x Displays whether 802.1X authentication has been configured on the device.
Example:
Device# show dot1x
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
65
IEEE 802.1X VLAN Assignment
Configuration Example for IEEE 802.1X VLAN Assignment
Attribute [64] must contain the value “VLAN” (type 13). Attribute [65] must contain the value “802” (type 6).
Attribute [81] specifies the VLAN name or VLAN ID assigned to the IEEE 802.1X-authenticated user.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
66
IEEE 802.1X VLAN Assignment
Example: Specifying an Authorized VLAN in the RADIUS Server Database
AdditionalReferencesforIEEE802.1XPort-BasedAuthentication
Related Documents
Security commands
• Cisco IOS Security Command Reference:
Commands A to C
• Cisco IOS Security Command Reference:
Commands D to L
• Cisco IOS Security Command Reference:
Commands M to R
• Cisco IOS Security Command Reference:
Commands S to Z
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
MIBs
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
67
IEEE 802.1X VLAN Assignment
Feature Information for IEEE 802.1X VLAN Assignment
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
68
IEEE 802.1X VLAN Assignment
Feature Information for IEEE 802.1X VLAN Assignment
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
69
IEEE 802.1X VLAN Assignment
Feature Information for IEEE 802.1X VLAN Assignment
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
70
CHAPTER 7
IEEE 802.1X Multiple Authentication
The IEEE 802.1X Multiple Authentication feature provides a means of authenticating multiple hosts on a
single port. With both 802.1X and non-802.1X devices, multiple hosts can be authenticated using different
methods. Each host is individually authenticated before it can gain access to the network resources.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
71
IEEE 802.1X Multiple Authentication
Restrictions for IEEE 802.1X Multiple Authentication
Before you can use the IEEE 802.1X Multiple Authentication feature, the switch must be connected to a Cisco
secure Access Control Server and RADIUS authentication, authorization, and accounting (AAA) must be
configured for web authentication. ACL download must be enabled.
If the authentication order includes the 802.1X port authentication method, you must enable IEEE 802.1X
authentication on the switch.
If the authentication order includes web authentication, configure a fallback profile that enables web
authentication on the switch and the interface.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
72
IEEE 802.1X Multiple Authentication
How to Configure IEEE 802.1X Multiple Authentication
• A host is authorized on the port with no VLAN assignment, and subsequent hosts either have no VLAN
assignment, or their VLAN information matches the operational VLAN.
• The first host authorized on the port has a group VLAN assignment, and subsequent hosts either have
no VLAN assignment, or their group VLAN matches the group VLAN on the port. Subsequent hosts
must use the same VLAN from the VLAN group as the first host. If a VLAN list is used, all hosts are
subject to the conditions specified in the VLAN list.
• Only one voice VLAN assignment is supported on a multi-auth port .
• After a VLAN is assigned to a host on the port, subsequent hosts must have matching VLAN information
or be denied access to the port.
• You cannot configure a guest VLAN or an auth-fail VLAN in multi-auth mode.
• The behavior of the critical-auth VLAN is not changed for multi-auth mode. When a host tries to
authenticate and the server is not reachable, all authorized hosts are reinitialized in the configured VLAN.
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server vsa send authentication
4. interface interface-id
5. access-session host-mode [multi-auth | multi-domain | multi-host | single-host] interface-id
6. end
7. show access-session interface interface-id
8. copy running-config startup-config
DETAILED STEPS
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
73
IEEE 802.1X Multiple Authentication
Configuration Examples for IEEE 802.1X Multiple Authentication
Example:
Device# configure terminal
Step 3 radius-server vsa send authentication Configures the Network Access Server (NAS) to
recognize and use vendor-specific attributes.
Example:
Device(config)# radius-server vsa send
authentication
Step 4 interface interface-id Specifies the port to which multiple hosts are indirectly
attached, and enters interface configuration mode.
Example:
Device(config)# interface Gigabitethernet 1/2/1
Step 5 access-session host-mode [multi-auth | multi-domain | Allows one client on the voice VLAN and multiple
multi-host | single-host] interface-id authenticated clients on the data VLAN.
• Each host is individually authenticated.
Example:
Device(config-if)# access-session host-mode
multi-auth
Example:
Device(config-if)# end
Example:
Device# show access-session interface g1/0/23
Example:
Device# copy running-config startup-config
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
74
IEEE 802.1X Multiple Authentication
Additional References
interface Gigabitethernet1/1/1
switchport access vlan 20
switchport voice vlan 117
no ip address
authentication host-mode multi-auth
authentication order mab
authentication port-control auto
mab
dot1x pae authenticator
end
Additional References
Related Documents
IPSec
• IPsec Management Configuration Guide, Cisco
IOS Release 15.2MT
• Internet Key Exchange for IPsec VPNs
Configuration Guide, Cisco IOS Release
15.2MT
• Security for VPNs with IPsec Configuration
Guide, Cisco IOS Release 15.2MT
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
75
IEEE 802.1X Multiple Authentication
Feature Information for IEEE 802.1X Multiple Authentication
Standards
Standard Title
IEEE 802.1X protocol —
MIBs
RFCs
RFC Title
RFC-3580 IEEE 802.1x Remote Authentication Dial In User
Service (RADIUS)
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
76
IEEE 802.1X Multiple Authentication
Feature Information for IEEE 802.1X Multiple Authentication
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
77
IEEE 802.1X Multiple Authentication
Feature Information for IEEE 802.1X Multiple Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
78
CHAPTER 8
IEEE 802.1X Multidomain Authentication
Multidomain authentication (MDA) allows both a data device and voice device, such as an IP phone (Cisco
or non-Cisco), to authenticate on the same switch port.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
79
IEEE 802.1X Multidomain Authentication
Restrictions for IEEE 802.1X Multidomain Authentication
The switch must be connected to a Cisco secure Access Control System (ACS) and RADIUS authentication,
authorization, and accounting (AAA) must be configured for Web authentication. If appropriate, you must
enable ACL download.
If the authentication order includes the 802.1X port authentication method, you must enable IEEE 802.1X
authentication on the switch.
If the authentication order includes web authentication, configure a fallback profile that enables web
authentication on the switch and the interface.
Note The web authentication method is not supported on Cisco integrated services routers (ISRs) or Integrated
Services Routers Generation 2 (ISR G2s) in Cisco IOS Release 15.2(2)T.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
80
IEEE 802.1X Multidomain Authentication
Guidelines for Configuring IEEE 802.1X Multidomain Authentication
Note When an access port is configured for multidomain authentication, the LED of a switch port stays green
as long as both the PC and IP Phone are authenticated. When the PC goes to sleep, or gets disconnected,
the LED of the switch port changes to amber. If the PC is reconnected, then the LED changes back to
green.
MDA does not enforce the order-of-device authentication. However, for best results, we recommend that a
voice device is authenticated before a data device on an MDA-enabled port.
When you connect IP phones to a dot1x secured port, we recommend that you use MDA, instead of Cisco
Discovery Protocol (CDP) bypass.
Note Any traffic destined to an unauthenticated client will be dropped. Traffic originating from an unauthenticated
device will not be dropped.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
81
IEEE 802.1X Multidomain Authentication
How to Configure IEEE 802.1X Multidomain Authentication
• Active fallback mechanisms such as guest VLAN and restricted VLAN remain configured after a port
changes from single-host or multihost mode to multidomain mode.
• Switching a port host mode from multidomain to single-host or multiple-hosts mode removes all
authorized devices from the port.
• If a data domain is authorized first and placed in the guest VLAN, non-802.1X-capable voice devices
need their packets tagged on the voice VLAN to trigger authentication. The phone need not need to send
tagged traffic. (The same is true for an 802.1X-capable phone.)
• It is not recommended to use per-user ACLs with an MDA-enabled port. An authorized device with a
per-user ACL policy might impact traffic on both the port voice and data VLANs. You can use only
one device on the port to enforce per-user ACLs.
1. configure terminal
2. radius-server vsa send authentication
3. interface type slot/port
4. access-session host-mode multi-domain
5. exit
DETAILED STEPS
Example:
Switch# configure terminal
Step 2 radius-server vsa send authentication Configures the network access server to recognize and use
vendor-specific attributes (VSAs).
Example:
Switch(config)# radius-server vsa send
authentication
Step 3 interface type slot/port Specifies the port to which multiple hosts are indirectly attached, and
enters interface configuration mode.
Example:
Switch(config)# interface
gigabitethernet0/1
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
82
IEEE 802.1X Multidomain Authentication
Configuring Critical Voice VLAN Support in Multidomain Authentication Mode
Example:
Switch(config)# exit
Note To configure MDA mode, see the “Configuring the Host Mode” section of the “Configuring IEEE 802.1X
Port-Based Authentication” chapter.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/port
4. authentication event server dead action authorize vlan vlan-id
5. authentication event server dead action authorize voice
DETAILED STEPS
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
83
IEEE 802.1X Multidomain Authentication
Configuration Examples for IEEE 802.1X Multidomain Authentication
Example:
Switch# configure terminal
Step 3 interface type slot/port Specifies the port to be configured and enters interface
configuration mode.
Example:
Switch(config)# interface gigabitethernet 0/1
Step 4 authentication event server dead action authorize Configures a critical data VLAN.
vlan vlan-id Note This step is only required if the authentication
event server dead action authorize vlan vlan-id
Example: command is not configured on the port.
Step 5 authentication event server dead action authorize Enables the Critical Voice VLAN feature, which puts phone
voice traffic into the configured voice VLAN of a port if the
authentication server becomes unreachable.
Example:
Switch(config-if)# authentication event server
dead action authorize voice
Device(config)interface GigabitEthernet0/0/0
Device(config-if)# switchport access vlan 110
Device(config-if)# switchport voice vlan 110
Device(config-if)# no ip address
Device(config-if)# authentication host-mode multi-domain
Device(config-if)# authentication port-control auto
Device(config-if)# mab
Device(config-if)# dot1x pae authenticator
Device(config-if)# end
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
84
IEEE 802.1X Multidomain Authentication
Example: Critical Voice VLAN Support in Multidomain Authentication Mode
Additional References
Related Documents
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
85
IEEE 802.1X Multidomain Authentication
Feature Information for IEEE 802.1X Multidomain Authentication
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
86
IEEE 802.1X Multidomain Authentication
Feature Information for IEEE 802.1X Multidomain Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
87
IEEE 802.1X Multidomain Authentication
Feature Information for IEEE 802.1X Multidomain Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
88
CHAPTER 9
IEEE 802.1X Flexible Authentication
The IEEE 802.1X Flexible Authentication feature provides a means of assigning authentication methods to
ports and specifying the order in which the methods are executed when an authentication attempt fails. Using
this feature, you can control which ports use which authentication methods, and you can control the failover
sequencing of methods on those ports.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
89
IEEE 802.1X Flexible Authentication
Prerequisites for IEEE 802.1X Flexible Authentication
Note No authentication method can follow web authentication in the configuration order.
Web authentication must be the last method configured.
• The web authentication method is not supported on Cisco integrated services routers (ISRs) or Integrated
Services Routers Generation 2 (ISR-G2s) in Cisco IOS Release 15.2(2)T.
• Layer 2 web authentication is not supported with flexible authentication.
• This feature does not support standard ACLs on the switch port.
• Configuring the same VLAN ID for both access and voice traffic (using the switchport access vlan
vlan-id and the switchport voice vlan vlan-id commands) will fail if authentication has already been
configured on the port.
• Configuring authentication on a port on which you have already configured switchport access vlan
vlan-id and switchport voice vlan vlan-id will fail if the access VLAN and voice VLAN have been
configured with the same VLAN ID.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
90
IEEE 802.1X Flexible Authentication
Information About IEEE 802.1X Flexible Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
91
IEEE 802.1X Flexible Authentication
IEEE 802.1X Authentication Order and Authentication Priority
SUMMARY STEPS
1. enable
2. configure terminal
3. dot1x system-auth-control
4. interface type slot/port
5. switchport
6. switchport mode access
7. switchport access vlan vlan-id
8. mab [eap]
9. access-session port-control{auto|force-authorized|force unauthorized}
10. authentication fallback profile
11. authentication order{dot1x [mab |webauth ][webauth] |mab [dot1x|webauth] [webauth] |webauth}
12. dot1x pae authenticator
13. end
DETAILED STEPS
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
92
IEEE 802.1X Flexible Authentication
Configuring Authentication Order
Example:
Device# configure terminal
Example:
Device(config)# interface Gigabitethernet 1/2/1
Example:
Device(config-if)# switchport
Step 6 switchport mode access Sets a nontrunking, nontagged single VLAN Layer 2
interface.
Example:
Device(config-if)# switchport mode access
Step 7 switchport access vlan vlan-id Sets the VLAN for the port.
Example:
Device(config-if)# switchport access vlan 2
Example:
Device(config-if)# access-session port-control
auto
Step 10 authentication fallback profile Configures the authorization state of the port and enables
web authentication.
Example: • Enable web authentication if the authentication order
Device(config-if)# authentication fallback
web-profile includes the webauth keyword ( see Step 11).
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
93
IEEE 802.1X Flexible Authentication
Configuring Authentication Priority
Example:
Device(config-if)# authentication order mab dot1x
webauth
Step 12 dot1x pae authenticator Enables the port to respond to messages meant for an
IEEE 802.1x authenticator.
Example:
Device(config-if)# dot1x pae authenticator
Example:
Device(config-if)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface typeslot/port
4. authentication priority {dot1x [mab | webauth] [webauth] | mab [dot1x | webauth] [webauth] |
webauth}
5. end
DETAILED STEPS
Example:
Switch# configure terminal
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
94
IEEE 802.1X Flexible Authentication
Configuration Examples for IEEE 802.1X Flexible Authentication
Example:
Switch(config)# interface Gigabitethernet 1/2/1
Step 4 authentication priority {dot1x [mab | webauth] [webauth] | Configures authentication priority.
mab [dot1x | webauth] [webauth] | webauth}
Example:
Switch(config-if)# authentication priority dot1x mab
webauth
Example:
Switch(config-if)# end
enable
configure terminal
dot1x system-auth-control
aaa new-model
aaa authentication login default group radius
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa authorization auth-proxy default group radius
aaa session-id common
ip http server
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
95
IEEE 802.1X Flexible Authentication
Additional References
Additional References
Related Documents
IPSec
• IPsec Management Configuration Guide, Cisco
IOS Release 15.2MT
• Internet Key Exchange for IPsec VPNs
Configuration Guide, Cisco IOS Release
15.2MT
• Security for VPNs with IPsec Configuration
Guide, Cisco IOS Release 15.2MT
Standard/RFC Title
IEEE 802.1X protocol —
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
96
IEEE 802.1X Flexible Authentication
Feature Information for IEEE 802.1X Flexible Authentication
MIBs
• CISCO–PAE–MIB http://www.cisco.com/go/mibs
• IEEE8021–PAE–MIB
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
97
IEEE 802.1X Flexible Authentication
Feature Information for IEEE 802.1X Flexible Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
98
CHAPTER 10
IEEE 802.1X Open Authentication
IEEE 802.1X Open Authentication allows a host to have network access without having to go through IEEE
802.1X authentication. Open authentication is useful in an applications such as the Preboot Execution
Environment (PXE), where a device must access the network to download a bootable image containing an
authentication client.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
99
IEEE 802.1X Open Authentication
Prerequisites for IEEE 802.1X Open Authentication
Note The web authentication method is not supported on Cisco integrated services routers (ISRs) or Integrated
Services Routers Generation 2 (ISR G2s) in Cisco IOS Release 15.2(2)T.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
100
IEEE 802.1X Open Authentication
Information About IEEE 802.1X Open Authentication
Note To configure open authentication you must have configured one of the four 802.1X host modes. For
information about configuring IEEE 802.1X host modes, see the “Configuring the Host Mode” section of
the “Configuring IEEE 802.1X Port-Based Authentication” chapter.
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. access-session port-control auto
4. access-session host-mode {single-host | multi-auth | multi-domain | multi-host} [open]
5. access-session open
6. end
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
101
IEEE 802.1X Open Authentication
Configuring IEEE 802.1X Open Authentication
DETAILED STEPS
Example:
Switch# configure terminal
Step 2 interface type slot/port Specifies the port to be configured, and enters interface
configuration mode. For the supported port types, see the “802.1x
Example: Authentication Configuration Guidelines” section of the
“Configuring IEEE 1802.1X Port-Based Authentication” module.
Switch(config)# interface gigabitethernet0/1
Example:
Switch(config-if)# access-session
port-control auto
Step 4 access-session host-mode {single-host | Configures the host mode (single-host mode, multiple-host mode,
multi-auth | multi-domain | multi-host} [open] multidomain authentication mode, and multiauthentication mode)
on the authorized port or allows open access (no access
Example: restrictions).
Example:
Switch(config-if)# end
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
102
IEEE 802.1X Open Authentication
Configuration Examples for IEEE 802.1X Open Authentication
Additional References
Related Documents
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
103
IEEE 802.1X Open Authentication
Feature Information for IEEE 802.1X Open Authentication
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
104
IEEE 802.1X Open Authentication
Feature Information for IEEE 802.1X Open Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
105
IEEE 802.1X Open Authentication
Feature Information for IEEE 802.1X Open Authentication
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
106
CHAPTER 11
IEEE 802.1X Auth Fail VLAN
You can configure an authentication failed (auth fail) VLAN for each 802.1X port on a switch stack or a
switch to provide limited services to clients that cannot access the guest VLAN. These clients are
802.1X-compliant and cannot access another VLAN because they fail the authentication process. An auth
fail VLAN allows users without valid credentials in an authentication server (typically, visitors to an enterprise)
to access a limited set of services. The administrator can control the services available to the auth fail VLAN.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
107
IEEE 802.1X Auth Fail VLAN
Prerequisites for IEEE 802.1X Auth Fail VLAN
Note The web authentication method is not supported on Cisco integrated services routers (ISRs) or Integrated
Services Routers Generation 2 (ISR G2s) in Cisco IOS Release 15.2(2)T.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
108
IEEE 802.1X Auth Fail VLAN
Information About IEEE 802.1X Auth Fail VLAN
Note You can configure a VLAN to be both the guest VLAN and the auth fail VLAN if you want to provide
the same services to both types of users.
Without this feature, the client attempts and fails authentication indefinitely, and the switch port remains in
the spanning-tree blocking state. With this feature, you can configure the switch port to be in the auth fail
VLAN after a specified number of authentication attempts (the default value is 3 attempts).
The authenticator counts the failed authentication attempts for the client. When this count exceeds the configured
maximum number of authentication attempts, the port moves to the auth fail VLAN. The failed attempt count
increments when the RADIUS server replies with either an EAP failure or an empty response without an EAP
packet. When the port moves into the auth fail VLAN, the failed attempt counter resets.
Users who fail authentication remain in the auth fail VLAN until the next reauthentication attempt. A port in
the auth fail VLAN tries to reauthenticate at configured intervals (the default is 60 seconds). If reauthentication
fails, the port remains in the auth fail VLAN. If reauthentication is successful, the port moves either to the
configured VLAN or to a VLAN sent by the RADIUS server. You can disable reauthentication. If you do
this, the only way to restart the authentication process is for the port to receive a link down or EAP logoff
event. It is recommended that you keep reauthentication enabled if a client might connect through a hub.
When a client disconnects from the hub, the port might not receive the link down or EAP logoff event.
After a port moves to the auth fail VLAN, a simulated EAP success message is sent to the client. This prevents
clients from indefinitely attempting authentication. Some clients (for example, devices running Windows XP)
cannot implement DHCP without EAP success.
Note Auth fail VLANs are supported only on 802.1X ports in single-host mode and on Layer 2 ports.
You can configure any active VLAN except an RSPAN VLAN or a voice VLAN as an 802.1X auth fail
VLAN. The auth fail VLAN feature is not supported on trunk ports; it is supported only on access ports.
Other security features such as dynamic ARP Inspection, DHCP snooping, and IP source guard can be
configured independently on an auth fail VLAN.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
109
IEEE 802.1X Auth Fail VLAN
How to Configure IEEE 802.1X Auth Fail VLAN
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. access-session port-control auto
4. authentication event fail action authorize vlan vlan-id
5. end
6. show access-session interface interface-id
7. copy running-config startup-config
DETAILED STEPS
Example:
Switch# configure terminal
Step 2 interface type slot/port Specifies the port to be configured, and enters interface
configuration mode. For the supported port types, see the
Example: “802.1X Authentication Configuration Guidelines” section
of the “Configuring IEEE 802.1X Port-Based
Switch(config)# interface gigabitethernet0/1
Authentication” chapter in the Catalyst 3750 Switch
Software Configuration Guide, 12.2(58)SE.
Example:
Switch(config-if)# access-session port-control
auto
Step 4 authentication event fail action authorize vlan vlan-id Specifies an active VLAN as an 802.1X auth fail VLAN.
The range is 1 to 4094.
Example:
Switch(config-if)# authentication event fail
action authorize vlan 40
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
110
IEEE 802.1X Auth Fail VLAN
Configuring the Number of Authentication Retries
Example:
Switch(config-if)# end
Example:
Switch# show access-session interface
gigabitethernet0/1
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Switch# copy running-config startup-config
What to Do Next
To disable and remove the auth fail VLAN, use the no authentication event fail interface configuration
command. The port returns to the default state.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. access-session port-control auto
4. authentication event fail action authorize vlan vlan-id
5. authentication event failretry retry-count
6. end
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
111
IEEE 802.1X Auth Fail VLAN
Configuring the Number of Authentication Retries
DETAILED STEPS
Example:
Switch# configure terminal
Step 2 interface interface-id Specifies the port to be configured, and enters interface
configuration mode. For the supported port types, see the
Example: “802.1X Authentication Configuration Guidelines” section of
the “Configuring IEEE 802.1X Port-Based Authentication”
Switch(config)# interface gigabitethernet0/1
chapter in the Catalyst 3750 Switch Software Configuration
Guide, 12.2(58)SE.
Example:
Switch(config-if)# access-session
port-control auto
Step 4 authentication event fail action authorize vlan Specifies an active VLAN as an 802.1X auth fail VLAN. The
vlan-id range is 1 to 4094.
Example:
Switch(config-if)# authentication event fail
action authorize vlan 40
Step 5 authentication event failretry retry-count Specifies a number of authentication attempts before a port
moves to the auth fail VLAN. The range is 0 to 5, and the
Example: default is 2 attempts after the initial failed event.
Example:
Switch(config-if)# end
Example
The following example shows how to set 2 as the number of authentication attempts allowed before the port
moves to the auth fail VLAN:
Switch(config-if)# authentication event retry 2
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
112
IEEE 802.1X Auth Fail VLAN
Configuration Examples for IEEE 802.1X Auth Fail VLAN
Additional References
Related Documents
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
113
IEEE 802.1X Auth Fail VLAN
Feature Information for IEEE 802.1X Auth Fail VLAN
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
Table 13: Feature Information for IEEE 802.1X Auth Fail VLAN
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
114
CHAPTER 12
Critical Voice VLAN Support
Critical Voice VLAN Support puts phone traffic into the configured voice VLAN of a port if the authentication
server becomes unreachable.
With normal network connectivity, when an IP phone successfully authenticates on a port, the authentication
server puts the phone into the voice domain. If the authentication server becomes unreachable, IP phones
cannot authenticate. In multidomain authentication (MDA) mode or multiauthentication mode, you can
configure the Critical Voice VLAN support feature to put phone traffic into the configured voice VLAN of
the port.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
115
Critical Voice VLAN Support
Information About Critical Voice VLAN Support
Note If a critical port is already authorized and reauthentication occurs, the switch puts the port in the
critical-authentication state in the current VLAN, which might be the one previously assigned by the
RADIUS server.
Note Inaccessible authentication bypass is compatible with guest VLAN. When a guest VLAN is enabled on
a 802.1X port, the features interact as follows: if all RADIUS servers are not available and if a client is
connected to a critical port and was previously assigned to a guest VLAN, the switch keeps the port in
the guest VLAN.
Note If critical voice is required, then critical data should be configured too. Otherwise, the critical voice client
will be displayed in the “authz fail” state while the voice VLAN will be open.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
116
Critical Voice VLAN Support
How to Configure Critical Voice VLAN Support
Note To configure MDA mode, see the “Configuring the Host Mode” section of the “Configuring IEEE 802.1X
Port-Based Authentication” chapter.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/port
4. authentication event server dead action authorize vlan vlan-id
5. authentication event server dead action authorize voice
DETAILED STEPS
Example:
Switch# configure terminal
Step 3 interface type slot/port Specifies the port to be configured and enters interface
configuration mode.
Example:
Switch(config)# interface gigabitethernet 0/1
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
117
Critical Voice VLAN Support
Configuring Critical Voice VLAN Support in Multiauthentication Mode
Step 5 authentication event server dead action authorize Enables the Critical Voice VLAN feature, which puts phone
voice traffic into the configured voice VLAN of a port if the
authentication server becomes unreachable.
Example:
Switch(config-if)# authentication event server
dead action authorize voice
Note To configure multiauthentication mode, see the “Configuring the Host Mode” section of the “Configuring
IEEE 802.1X Port-Based Authentication” chapter.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/port
4. authentication event server dead action reinitialize vlan vlan-id
5. authentication event server dead action authorize voice
DETAILED STEPS
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
118
Critical Voice VLAN Support
Configuration Examples for Critical Voice VLAN Support
Example:
Switch# configure terminal
Step 3 interface type slot/port Specifies the port to be configured and enters interface
configuration mode.
Example:
Switch(config)# interface gigabitethernet 0/1
Step 4 authentication event server dead action reinitialize Configures a critical data VLAN.
vlan vlan-id Note This step is only required if the authentication event
server dead action authorize vlan
Example: critical-data-vlan-id command is not configured on
the port.
Switch(config-if)# authentication event server
dead action reinitialize vlan 40
Step 5 authentication event server dead action authorize Enables the Critical Voice VLAN support feature, which puts
voice phone traffic into the configured voice VLAN of a port if the
authentication server becomes unreachable.
Example:
Switch(config-if)# authentication event server
dead action authorize voice
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
119
Critical Voice VLAN Support
Example: Critical Voice VLAN Support in Multiauthentication Mode
Additional References
Related Documents
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
120
Critical Voice VLAN Support
Feature Information for Critical Voice VLAN Support
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
121
Critical Voice VLAN Support
Feature Information for Critical Voice VLAN Support
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
122
CHAPTER 13
IEEE 802.1X Wake on LAN Support
The IEEE 802.1X Wake on LAN (WoL) Support feature allows dormant PCs to be powered up when the
switch receives a specific Ethernet frame, known as the “magic packet.” You can use this feature in
environments where administrators need to connect to systems that have been powered down.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
123
IEEE 802.1X Wake on LAN Support
Restrictions for IEEE 802.1X Wake on LAN Support
The switch must be connected to a Cisco secure Access Control Sytem (ACS) and RADIUS authentication,
authorization, and accounting (AAA) must be configured for Web authentication. If appropriate, you must
enable ACL download.
If the authentication order includes the 802.1X port authentication method, you must enable IEEE 802.1X
authentication on the switch.
If the authentication order includes web authentication, configure a fallback profile that enables web
authentication on the switch and the interface.
Note The web authentication method is not supported on Cisco integrated services routers (ISRs) or Integrated
Services Routers Generation 2 (ISR G2s) in Cisco IOS Release 15.2(2)T.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
124
IEEE 802.1X Wake on LAN Support
How to Configure IEEE 802.1X Wake on LAN Support
other than EAPOL packets. The host can receive packets but cannot send packets to other devices in the
network.
Note If PortFast is not enabled on the port, the port is forced to the bidirectional state.
When you configure a port as unidirectional by using the authentication control-direction command in
interface configuration command, the port changes to the spanning-tree forwarding state. The port can send
packets to the host but cannot receive packets from the host.
When you configure a port as bidirectional by using the authentication control-direction both interface
configuration command, the port is access-controlled in both directions. The port does not receive packets
from or send packets to the host.
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. access-session control-direction {both | in}
4. end
5. show authentication interface interface-id
6. copy running-config startup-config
DETAILED STEPS
Example:
Switch# configure terminal
Step 2 interface type slot/port Specifies the port to which multiple hosts are indirectly
attached, and enters interface configuration mode.
Example:
Switch(config)# interface gigabitethernet0/1
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
125
IEEE 802.1X Wake on LAN Support
Configuration Examples for IEEE 802.1X Wake on LAN Support
Example:
Switch(config-if)# end
Example:
Switch# show authentication interface
gigabitethernet0/1
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Switch# copy running-config startup-config
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
126
IEEE 802.1X Wake on LAN Support
Additional References
Additional References
Related Documents
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
127
IEEE 802.1X Wake on LAN Support
Feature Information for IEEE 802.1X Wake on LAN Support
Table 15: Feature Information for IEEE 802.1X Wake on LAN Support
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
128
CHAPTER 14
Per-User ACL Support for 802.1X/MAB/Webauth
Users
This feature allows per-user ACLs to be downloaded from the Cisco Access Control Server (ACS) as policy
enforcement after authentication using IEEE 802.1X, MAB authentication bypass, or web authentication.
PrerequisitesforPer-UserACLSupportfor802.1X/MAB/Webauth
Users
• AAA authentication must be enabled.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
129
Per-User ACL Support for 802.1X/MAB/Webauth Users
Restrictions for Per-User ACL Support for 802.1X/MAB/Webauth Users
• AAA authorization must be enabled by using the network keyword to allow interface configuration
from the RADIUS server.
• 802.1X authentication must be enabled.
• The user profile and VSAs must be configured on the RADIUS server.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
130
Per-User ACL Support for 802.1X/MAB/Webauth Users
How to Configure Per-User ACL Support for 802.1X/MAB/Webauth Users
does not support port ACLs in the egress direction on Layer 2 ports. For more information, see the “Configuring
Network Security with ACLs|” module.
The extended ACL syntax style should be used to define the per-user configuration that is stored on the
RADIUS server. When the definitions are passed from the RADIUS server, they are created by using the
extended naming convention. However, if the Filter-Id attribute is used, it can point to a standard ACL.
The Filter-Id attribute can be used to specify an inbound or outbound ACL that is already configured on the
switch. The attribute contains the ACL number followed by .in for ingress filtering or .out for egress filtering.
If the RADIUS server does not allow the .in or .out syntax, the access list is applied to the outbound ACL by
default. Because of limited support of Cisco IOS access lists on the switch, the Filter-Id attribute is supported
only for IP ACLs numbered 1 to 199 and 1300 to 2699 (IP standard and IP extended ACLs).
Only one 802.1X-authenticated user is supported on a port. If the multiple-hosts mode is enabled on the port,
the per-user ACL attribute is disabled for the associated port.
The maximum size of the per-user ACL is 4000 ASCII characters but is limited by the maximum size of
RADIUS-server per-user ACLs.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip device tracking
4. aaa new-model
5. aaa authorization network default group radius
6. radius-server vsa send authentication
7. interface interface-id
8. ip access-group acl-id in
9. end
10. show running-config interfaceinterface-id
11. copy running-config startup-config
DETAILED STEPS
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
131
Per-User ACL Support for 802.1X/MAB/Webauth Users
Configuring Downloadable ACLs
Example:
Switch# configure terminal
Example:
Switch(config)# ip device tracking
Example:
Switch(config)# aaa new-model
Step 5 aaa authorization network default group radius Sets the authorization method. To remove the
authorization method, use the no aaa authorization
Example: network default group radius command.
Switch(config)# aaa authorization network default
group radius
Step 6 radius-server vsa send authentication Configures the network access server.
Example:
Switch(config)# radius-server vsa send
autentication
Step 7 interface interface-id Specifies the port to be configured, and enters interface
configuration mode.
Example:
Switch(config)# interface gigabitethernet0/1
Step 8 ip access-group acl-id in Configures the default ACL on the port in the input
direction.
Example: Note The ACL ID is an access list name or
Switch(config-if)# ip access-group 99 in
number.
Step 9 end Switch(config-if)# end
Returns to Privileged EXEC mode.
Step 10 show running-config interfaceinterface-id Displays the specific interface configuration for
verification.
Example:
Switch# show running-config interface
interface-id
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
132
Per-User ACL Support for 802.1X/MAB/Webauth Users
Configuration Examples for Per-User ACL Support for 802.1X/MAB/Webauth Users
Example:
Switch# copy running-config startup-config
Additional References
Related Documents
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
133
Per-User ACL Support for 802.1X/MAB/Webauth Users
Feature Information for Per-User ACL Support for 802.1X/MAB/Webauth Users
Standard/RFC Title
IEEE 802.1X protocol —
MIBs
• CISCO–PAE–MIB http://www.cisco.com/go/mibs
• IEEE8021–PAE–MIB
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
134
Per-User ACL Support for 802.1X/MAB/Webauth Users
Feature Information for Per-User ACL Support for 802.1X/MAB/Webauth Users
Table 16: Feature Information for Per-User ACL Support for 802.1X/MAB/Webauth Users
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
135
Per-User ACL Support for 802.1X/MAB/Webauth Users
Feature Information for Per-User ACL Support for 802.1X/MAB/Webauth Users
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
136