Chapter 25
Configuring IEEE 802.1X Port-Based Authentication
In a point-to-point configuration (see
802.1X-enabled router port. The router detects the client when the port link state changes to the up state.
If a client leaves or is replaced with another client, the router changes the port link state to down, and
the port returns to the unauthorized state.
Figure 25-3
as a multiple-host port that becomes authorized as soon as one client is authenticated. When the port is
authorized, all other hosts indirectly attached to the port are granted access to the network. If the port
becomes unauthorized (reauthentication fails or an EAPOL-logoff message is received), the router
denies access to the network to all of the attached clients. In this topology, the wireless access point is
responsible for authenticating the clients attached to it, and the wireless access point acts as a client to
the router.
Figure 25-3 Wireless LAN Example
Wireless clients
Default 802.1X Port-Based Authentication Configuration
Table 25-1
Table 25-1 Default 802.1X Configuration
Feature
Authentication, authorization, and
accounting (AAA)
RADIUS server IP address
RADIUS server UDP authentication port
RADIUS server key
Per-interface 802.1X protocol enable state
Periodic reauthentication
Number of seconds between
reauthentication attempts
Quiet period
78-14064-04
shows 802.1X port-based authentication in a wireless LAN. The 802.1X port is configured
Access point
shows the default 802.1X configuration.
Cisco 7600 Series Router Cisco IOS Software Configuration Guide—12.1E
Default 802.1X Port-Based Authentication Configuration
Figure 25-1 on page
25-2), only one client can be connected to the
Catalyst switch
or
Cisco Router
Default Setting
Disabled
None specified
1812
None specified
Disabled (force-authorized)
Note
The port transmits and receives normal traffic
without 802.1X-based authentication of the
client.
Disabled
3600 seconds
60 seconds (number of seconds that the router remains in
the quiet state following a failed authentication exchange
with the client)
Authentication
server
(RADIUS)
25-5