Chapter 10
Configuring IEEE 802.1x Port-Based Authentication
Command
Step 3
aaa accounting dot1x default
start-stop group radius
Step 4
aaa accounting system default
start-stop group radius
Step 5
end
Step 6
show running-config
Step 7
copy running-config startup-config
Use the show radius statistics privileged EXEC command to display the number of RADIUS messages
that do not receive the accounting response message.
This example shows how to configure 802.1x accounting. The first command configures the RADIUS
server, specifying 1813 as the UDP port for accounting:
Switch(config)# radius-server host 172.120.39.46 auth-port 1812 acct-port 1813 key rad123
Switch(config)# aaa accounting dot1x default start-stop group radius
Switch(config)# aaa accounting system default start-stop group radius
Configuring a Guest VLAN
When you configure a guest VLAN, clients that are not 802.1x-capable are put into the guest VLAN
when the server does not receive a response to its EAP request/identity frame. Clients that are
802.1x-capable but that fail authentication are not granted network access. The switch supports guest
VLANs in single-host or multiple-hosts mode.
Beginning in privileged EXEC mode, follow these steps to configure a guest VLAN. This procedure is
optional.
Command
Step 1
configure terminal
Step 2
interface interface-id
Step 3
switchport mode access
or
switchport mode private-vlan host
Step 4
dot1x port-control auto
Step 5
dot1x guest-vlan vlan-id
Step 6
end
OL-9775-08
Purpose
Enable 802.1x accounting using the list of all RADIUS servers.
(Optional) Enables system accounting (using the list of all RADIUS
servers) and generates system accounting reload event messages when the
switch reloads.
Return to privileged EXEc mode.
Verify your entries.
(Optional) Saves your entries in the configuration file.
Purpose
Enter global configuration mode.
Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the
Configuration Guidelines" section on page
Set the port to access mode,
or
Configure the Layer 2 port as a private-VLAN host port.
Enable 802.1x authentication on the port.
Specify an active VLAN as an 802.1x guest VLAN. The range is 1 to
4094.
You can configure any active VLAN except an internal VLAN (routed
port), an RSPAN VLAN, a primary private VLAN, or a voice VLAN as
an 802.1x guest VLAN.
Return to privileged EXEC mode.
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
Configuring 802.1x Authentication
"802.1x Authentication
10-35.
10-51