Reference Guide
Defaults Not configured.
Command Modes CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, refer to the
relevant
FTOS Command Line Reference Guide
.
The following is a list of the FTOS version history for this command.
Version 8.3.19.0 Introduced on the S4820T.
Version 8.3.11.1 Introduced on the Z9000.
Version 8.3.7.0 Introduced on the S4810.
Version 7.7.1.0 Authentication key length increased to 42 characters.
Version 7.6.1.0 Introduced on the S-Series.
Version 7.5.1.0 Introduced on the C-Series.
pre-Version
6.2.1.1
Introduced on the E-Series.
Usage
Information
The key configured with this command must match the key configured on the TACACS+
daemon.
Port Authentication (802.1X) Commands
An authentication server must authenticate a client connected to an 802.1X switch port. Until the authentication, only
Extensible Authentication Protocol over LAN (EAPOL) traffic is allowed through the port to which a client is connected.
After authentication is successful, normal traffic passes through the port.
FTOS supports RADIUS and Active Directory environments using 802.1X Port Authentication.
Important Points to Remember
FTOS limits network access for certain users by using VLAN assignments. 802.1X with VLAN assignment has these
characteristics when configured on the switch and the RADIUS server.
• 802.1X is supported on S4820T.
• 802.1X is not supported on the LAG or the channel members of a LAG.
• If no VLAN is supplied by the RADIUS server or if 802.1X authorization is disabled, the port is configured in its
access VLAN after successful authentication.
• If 802.1X authorization is enabled but the VLAN information from the RADIUS server is not valid, the port returns
to the Unauthorized state and remains in the configured access VLAN. This prevents ports from appearing
unexpectedly in an inappropriate VLAN due to a configuration error. Configuration errors create an entry in
Syslog.
• If 802.1X authorization is enabled and all information from the RADIUS server is valid, the port is placed in the
specified VLAN after authentication.
• If port security is enabled on an 802.1X port with VLAN assignment, the port is placed in the RADIUS server
assigned VLAN.
• If 802.1X is disabled on the port, it is returned to the configured access VLAN.
1225










