Users Guide

Important Points to Remember
Dell Networking OS limits network access for certain users by using VLAN assignments. 802.1X with VLAN assignment has these
characteristics when congured on the switch and the RADIUS server.
802.1X is supported on Dell Networking OS.
802.1X is not supported on the LAG or the channel members of a LAG.
If no VLAN is supplied by the RADIUS server or if 802.1X authorization is disabled, the port is congured in its access VLAN after
successful authentication.
If 802.1X authorization is enabled but the VLAN information from the RADIUS server is not valid, the port returns to the Unauthorized
state and remains in the congured access VLAN. This prevents ports from appearing unexpectedly in an inappropriate VLAN due to a
conguration error. Conguration errors create an entry in Syslog.
If 802.1X authorization is enabled and all information from the RADIUS server is valid, the port is placed in the specied VLAN after
authentication.
If port security is enabled on an 802.1X port with VLAN assignment, the port is placed in the RADIUS server assigned VLAN.
If 802.1X is disabled on the port, it is returned to the congured access VLAN.
When the port is in the Force Authorized, Force Unauthorized, or Shutdown state, it is placed in the congured access VLAN.
If an 802.1X port is authenticated and put in the RADIUS server assigned VLAN, any change to the port access VLAN conguration
does not take eect.
The 802.1X with VLAN assignment feature is not supported on trunk ports, dynamic ports, or with dynamic-access port assignment
through a VLAN membership.
dot1x authentication (Conguration)
Enable dot1x globally; dot1x must be enabled both globally and at the interface level.
Syntax
dot1x authentication
To disable dot1x on globally, use the no dot1x authentication command.
Defaults Disabled.
Command Modes CONFIGURATION
Command History
This guide is platform-specic. For command information about other platforms, see the relevant Dell Networking
OS Command Line Reference Guide.
Version Description
9.8(1.0) Introduced on the Z9100-ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the C-Series and S-Series.
7.4.1.0 Introduced on the E-Series.
Security 1333