Cisco Systems 2960 Manual De Usuario
C H A P T E R
10-1
Catalyst 2960 and 2960-S Switch Software Configuration Guide
OL-8603-09
10
Configuring IEEE 802.1x Port-Based
Authentication
Authentication
IEEE 802.1x port-based authentication prevents unauthorized devices (clients) from gaining access to
the network. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack.
the network. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack.
Note
Stacking is supported only on Catalyst 2960-S switches running the LAN base image.
The Catalyst 2960 switch command reference and the “RADIUS Commands” section in the Cisco IOS
Security Command Reference, Release 12.2, have command syntax and usage information.
Security Command Reference, Release 12.2, have command syntax and usage information.
This chapter includes these sections:
•
•
•
Understanding IEEE 802.1x Port-Based Authentication
The standard defines a client-server-based access control and authentication protocol to prevent
unauthorized clients from connecting to a LAN through publicly accessible ports.The authentication
server authenticates each client connected to a switch port before making available any switch or LAN
services.
unauthorized clients from connecting to a LAN through publicly accessible ports.The authentication
server authenticates each client connected to a switch port before making available any switch or LAN
services.
Until the client is authenticated, IEEE 802.1x access control allows only Extensible Authentication
Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP)
traffic through the port to which the client is connected. After authentication, normal traffic passes
through the port.
Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP)
traffic through the port to which the client is connected. After authentication, normal traffic passes
through the port.
•
•
•
•
•
•
•