Configuring 802.1X Network Access Control

This example configures a single RADIUS (Remote Authentication Dial In User Service) server used for authentication and accounting at 10.10.10.10. The shared secret is configured to be secret. The switch is configured to require that the 802.1X access method is through a RADIUS server. IEEE 802.1X port-based access control is enabled for the system, and interface 1/0/1 is configured to be in force-authorized mode because this is where the RADIUS server and protected network resources are located.

Click to expand in new window
Switch with 802.1x Network Access Control
GUID-7E5EE0A5-7CAE-4ECD-9A87-6882BEFEE7AE-low.png

If a user, or supplicant, attempts to communicate via the switch on any interface except interface 1/0/1, the system challenges the supplicant for login credentials. The system encrypts the provided information and transmits it to the RADIUS server. If the RADIUS server grants access, the system sets the 802.1X port state of the interface to authorized, and the supplicant is able to access network resources.