Cisco Systems 3130 User Manual

Page of 1226
 
9-6
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter 9      Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
Figure 9-3
Message Exchange
If IEEE 802.1x authentication times out while waiting for an EAPOL message exchange and MAC 
authentication bypass is enabled, the switch can authorize the client when the switch detects an Ethernet 
packet from the client. The switch uses the MAC address of the client as its identity and includes this 
information in the RADIUS-access/request frame that is sent to the RADIUS server. After the server 
sends the switch the RADIUS-access/accept frame (authorization is successful), the port becomes 
authorized. If authorization fails and a guest VLAN is specified, the switch assigns the port to the guest 
VLAN. If the switch detects an EAPOL packet while waiting for an Ethernet packet, the switch stops 
the MAC authentication bypass process and stops IEEE 802.1x authentication.
 shows the message exchange during MAC authentication bypass.
Figure 9-4
Message Exchange During MAC Authentication Bypass
201761
Client
Port Authorized
Port Unauthorized
EAPOL-Start
EAP-Request/Identity
EAP-Response/Identity
EAP-Request/OTP
EAP-Response/OTP
EAP-Success
RADIUS Access-Request
RADIUS Access-Challenge
RADIUS Access-Request
RADIUS Access-Accept
EAPOL-Logoff
Authentication
server
(RADIUS)
2
01762
Client
Switch
EAPOL Request/Identity
EAPOL Request/Identity
EAPOL Request/Identity
RADIUS Access/Request
RADIUS Access/Accept
Ethernet packet
Authentication
server
(RADIUS)