Cisco Systems 3560 Manual De Usuario

Descargar
Página de 1288
 
10-56
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 10      Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
This example shows how to configure a switch as a supplicant:
Switch# configure terminal
Switch(config)# cisp enable
Switch(config)# dot1x credentials test
Switch(config)# username suppswitch
Switch(config)# 
password 
myswitch
Switch(config)# interface gigabitethernet 1/0/1
Switch(config-if)# switchport trunk encapsulation dot1q
Switch(config-if)# dot1x pae supplicant
Switch(config-if)# dot1x credentials test
 
Switch(config-if)# end
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs
In addition to configuring 802.1x authentication on the switch, you need to configure the ACS. For more 
information, see the 
Cisco Secure ACS configuration guides
.
Note
You must configure a downloadable ACL on the ACS before downloading it to the switch. 
After authentication on the port, you can use the show ip access-list privileged EXEC command to 
display the downloaded ACLs on the port.
Configuring Downloadable ACLs
The policies take effect after client authentication and the client IP address addition to the IP device 
tracking table. The switch then applies the downloadable ACL to the port.
Beginning in privileged EXEC mode:
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip device tracking
Configure the ip device tracking table.
Step 3
aaa new-model
Enables AAA.
Step 4
 aaa authorization network default group 
radius
Sets the authorization method to local. To remove the 
authorization method, use the no aaa authorization network 
default group radius 
command.
Step 5
radius-server vsa send authentication
Configure the radius vsa send authentication.
Step 6
interface interface-id
Specify the port to be configured, and enter interface 
configuration mode.
Step 7
ip access-group acl-id in
Configure the default ACL on the port in the input direction.
Note
The acl-id is an access list name or number.
Step 8
show running-config interface interface-id
Verify your configuration.
Step 9
copy running-config startup-config
(Optional) Save your entries in the configuration file.