Cisco Systems 3750E 用户手册
C H A P T E R
10-1
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
10
Configuring IEEE 802.1x Port-Based
Authentication
Authentication
This chapter describes how to configure IEEE 802.1x port-based authentication on the Catalyst 3750-E
or 3560-E switch. IEEE 802.1x authentication prevents unauthorized devices (clients) from gaining
access to the network.Unless otherwise noted, the term switch refers to a Catalyst 3750-E or 3560-E
standalone switch and to a Catalyst 3750-E switch stack.
or 3560-E switch. IEEE 802.1x authentication prevents unauthorized devices (clients) from gaining
access to the network.Unless otherwise noted, the term switch refers to a Catalyst 3750-E or 3560-E
standalone switch and to a Catalyst 3750-E switch stack.
Note
For complete syntax and usage information for the commands used in this chapter, see the “RADIUS
Commands” section in the Cisco IOS Security Command Reference, Release 12.2 and the command
reference or this release.
Commands” section in the Cisco IOS Security Command Reference, Release 12.2 and the command
reference or this release.
This chapter consists of these sections:
•
•
•
Understanding IEEE 802.1x Port-Based Authentication
The IEEE 802.1x standard defines a client-server-based access control and authentication protocol that
prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they
are properly authenticated. The authentication server authenticates each client connected to a switch port
before making available any services offered by the switch or the LAN.
prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they
are properly authenticated. The authentication server authenticates each client connected to a switch port
before making available any services offered by the switch or the LAN.
Until the client is authenticated, IEEE 802.1x access control allows only Extensible Authentication
Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP)
traffic through the port to which the client is connected. After authentication is successful, normal traffic
can pass through the port.
Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP)
traffic through the port to which the client is connected. After authentication is successful, normal traffic
can pass through the port.
These sections describe IEEE 802.1x port-based authentication:
•
•
•
•
•