Access Security Guide K/KA/KB.15.15

Configuring 802.1X Open VLAN Mode.........................................................................467
Inspecting 802.1X Open VLAN Mode Operation.............................................................468
Option For Authenticator Ports: Configure Port-Security To Allow Only 802.1X-Authenticated
Devices......................................................................................................................468
Viewing 802.1X Open VLAN Mode Status......................................................................471
Show Commands for Port-Access Supplicant...................................................................473
Note on Supplicant Statistics....................................................................................474
How RADIUS/802.1X Authentication Affects VLAN Operation..........................................474
VLAN Assignment on a Port.....................................................................................475
Example of Untagged VLAN Assignment in a RADIUSBased Authentication Session........475
Port-Security................................................................................................................477
Configure the port access type.................................................................................477
Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other
Switches....................................................................................................................478
Supplicant Port Configuration........................................................................................479
Enabling a Switch Port as a Supplicant......................................................................479
Configuring a Supplicant Switch Port.........................................................................479
Configuring Mixed Port Access Mode.................................................................................480
General 802.1X Authenticator Operation............................................................................480
Example of the Authentication Process............................................................................480
VLAN Membership Priorities.........................................................................................481
Viewing...............................................................................................................................482
Displaying 802.1X Configuration, Statistics, and Counters.....................................................482
Show Commands for Port-Access Authenticator...............................................................482
Using..................................................................................................................................484
Enabling the Use of GVRP-Learned Dynamic VLANs in Authentication Sessions........................484
Overview............................................................................................................................485
General Features.............................................................................................................485
Introduction.....................................................................................................................486
VLAN Membership Priorities..............................................................................................487
Use Models for 802.1X Open VLAN Modes........................................................................487
802.1X Open VLAN Operating Notes................................................................................490
Operating Rules for Authorized-Client and Unauthorized-Client VLANs....................................491
General Operating Rules and Notes...................................................................................493
Operating Notes.........................................................................................................495
Unauthenticated VLAN Access (Guest VLAN Access).......................................................495
Characteristics of Mixed Port Access Mode.....................................................................495
Operating Notes VLAN Assignment on a Port......................................................................496
Messages Related to 802.1X Operation...................................................................................497
16 Secure Mode (3800, 5400zl, and 8200zl Switches).................................498
Configuring.........................................................................................................................498
Configuring secure mode..................................................................................................498
Commands affected when enhanced secure mode is enabled................................................498
Feature-specific show commands........................................................................................498
Show flash and show version command output....................................................................499
Show config commands....................................................................................................499
MIB CLI commands..........................................................................................................499
Password commands........................................................................................................500
Additional password command option................................................................................500
Prompt for password when first logging in...........................................................................500
Behavior when changing or exiting levels............................................................................500
Additional password commands........................................................................................501
Secret keys......................................................................................................................501
SSH changes...................................................................................................................502
18 Contents