Configuration manual
10-31
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-03
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Configuring IEEE 802.1x Authentication
Figure 10-9 Authenticator and Supplicant Switch using CISP
For more information, see the “Configuring 802.1x Switch Supplicant with NEAT” section on
page 10-55.
Configuring IEEE 802.1x Authentication
These sections contain this configuration information:
• Default IEEE 802.1x Authentication Configuration, page 10-32
• IEEE 802.1x Authentication Configuration Guidelines, page 10-33
• Configuring IEEE 802.1x Authentication, page 10-36 (required)
• Configuring 802.1x Readiness Check, page 10-38
• Configuring IEEE 802.1x Violation Modes, page 10-36
• Configuring Voice Aware 802.1x Security, page 10-39
• Configuring the Switch-to-RADIUS-Server Communication, page 10-40 (required)
• Configuring the Host Mode, page 10-42 (optional)
• Configuring Periodic Re-Authentication, page 10-43 (optional)
• Manually Re-Authenticating a Client Connected to a Port, page 10-44 (optional)
• Changing the Quiet Period, page 10-44 (optional)
• Changing the Switch-to-Client Retransmission Time, page 10-45 (optional)
• Setting the Switch-to-Client Frame-Retransmission Number, page 10-46 (optional)
• Setting the Re-Authentication Number, page 10-46 (optional)
• Configuring IEEE 802.1x Accounting, page 10-47 (optional)
• Configuring a Guest VLAN, page 10-48 (optional)
• Configuring a Restricted VLAN, page 10-49 (optional)
• Configuring the Inaccessible Authentication Bypass Feature, page 10-51 (optional)
• Configuring IEEE 802.1x Authentication with WoL, page 10-53 (optional)
1 Workstations (clients) 2 Supplicant switch (outside wiring closet)
3 Authenticator switch 4 Access control server (ACS)
5 Trunk port
205718
1
2 3
5
4