Cisco Systems 3560X Manual De Usuario

Descargar
Página de 1438
C H A P T E R
 
11-1
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
11
Configuring IEEE 802.1x Port-Based 
Authentication
This chapter describes how to configure IEEE 802.1x port-based authentication on the Catalyst 3750-X 
or 3560-X switch. IEEE 802.1x authentication prevents unauthorized devices (clients) from gaining 
access to the network.Unless otherwise noted, the term switch refers to a Catalyst 3750-X or 3560-X 
standalone switch and to a Catalyst 3750-X switch stack.
Note
For complete syntax and usage information for the commands used in this chapter, see the “RADIUS 
Commands” section in the Cisco IOS Security Command Reference, Release 12.2 and the command 
reference or this release.
Switches running the IP base or IP services feature set also support Cisco TrustSec Security Group Tag 
(SGT) Exchange Protocol (SxP). This feature supports security group access control lists (SGACLs), 
which define ACL policies for a group of devices instead of an IP address. The SXP control protocol 
allows carrying the SGT information between access-layer devices at the Cisco TrustSec domain edge, 
and distribution layer devices within the Cisco TrustSec domain when the access-layer devices do not 
have the hardware capability to tag the packets. These switches operate as access layer switches in the 
Cisco TrustSec network.
For more information about Cisco TrustSec, see the “Cisco TrustSec Switch Configuration Guide” at this 
URL:
http://www.cisco.com/en/US/docs/switches/lan/trustsec/configuration/guide/trustsec.html
The sections on SXP define the capabilities supported on the switch.
This chapter consists of these sections:
Understanding IEEE 802.1x Port-Based Authentication, page 11-1
Configuring 802.1x Authentication, page 11-34
Displaying 802.1x Statistics and Status, page 11-69
Understanding IEEE 802.1x Port-Based Authentication
The IEEE 802.1x standard defines a client-server-based access control and authentication protocol that 
prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they 
are properly authenticated. The authentication server authenticates each client connected to a switch port 
before making available any services offered by the switch or the LAN.