IEEE 802 1X

background image

packetlife.net

by Jeremy Stretch

v2.0

IEEE 802.1X

802.1X Header

Configuration

! Define a RADIUS server

radius-server host 10.0.0.100
radius-server key MyRadiusKey

! Configure 802.1X to authenticate via AAA

aaa new-model
aaa authentication dot1x default group radius

! Enable 802.1X authentication globally

dot1x system-auth-control

Global Configuration

! Static access mode

switchport mode access

! Enable 802.1X authentication per port

dot1x port-control auto

! Configure host mode (single or multi)

dot1x host-mode single-host

! Configure maximum authentication attempts

dot1x max-reauth-req

! Enable periodic reauthentication

dot1x reauthentication

! Configure a guest VLAN

dot1x guest-vlan 123

! Configure a restricted VLAN

dot1x auth-fail vlan 456
dot1x auth-fail max-attempts 3

Interface Configuration

802.1X Packet Types

EAP Codes

0 EAP Packet

1 EAPOL-Start

2 EAPOL-Logoff

3 EAPOL-Key

4 EAPOL-Encap-ASF-Alert

1 Request

2 Response

3 Success

4 Failure

Terminology

EAP Over LANs (EAPOL)
EAP encapsulated by 802.1X for transport across LANs

Extensible Authentication Protocol (EAP)
A flexible authentication framework defined in RFC 3748

Authentication Server
A backend server which authenticates the credentials
provided by supplicants (for example, a RADIUS server)

Troubleshooting

show dot1x [statistics] [interface <interface>]

dot1x test eapol-capable [interface <interface>]

dot1x re-authenticate interface <interface>

EAP Header

EAP Flow Chart

Supplicant
The device (client) attached to an access link that requests
authentication by the authenticator

Authenticator
The device that controls the status of a link; typically a
wired switch or wireless access point

Guest VLAN
Fallback VLAN for clients not 802.1X-capable

Restricted VLAN
Fallback VLAN for clients which fail authentication

Interface Defaults

Max Auth Requests 2

Reauthentication Off

Quiet Period 60s

Reauth Period 1hr

Server Timeout 30s

EAP Req/Resp Types

1 Identity

2 Notification

3 Nak

4 MD5 Challenge

Supplicant Timeout 30s

Tx Period 30s

5 One Time Password

6 Generic Token Card

254 Expanded Types

255 Experimental

Port-Control Options

force-unauthorized
Always unauthorized; authentication attempts are ignored

force-authorized
Port will always remain in authorized state (default)

auto
Supplicants must authenticate to gain access

Identity Request

Identity Response

Challenge Request

Challenge Response

Success

Access Request

Access Challenge

Access Request

Access Accept

EAP

RADIUS

Code

Identifier

Length

Data

1

1

2

Version

Type

Length

EAP

1

1

2

Supplicant

Authenticator

Authentication

Server


Wyszukiwarka

Podobne podstrony:
IEEE 802 1x
IEEE 802 id 209525 Nieznany
ieee 802 11 wireless lan security performance GQRO5B5TUOC7HMLSH2CWB5FMY6KJ5CX2O42KGCQ
802 1X
Instrukcja instalacji Adapter Wi Fi Ferguson USB W02 IEEE 802 11bgn 150Mbps
IEEE 802
IEEE 802 id 209525 Nieznany
Lab 1 OPNET Analiza sieci standardu IEEE 802 11 hacked by reczu
802 11 Bezpieczeństwo
IEEE 1451 czujniki
802 3as
Bach Duet 802 nie
TPL 1x, Recepty, Wyklady TLP
Historyczne ciesielskie konstrukcje?chowe Propozycja systematyki i uporządkowania terminologii, cz
Malzenstwo i rodzina 50 pytan 1x
Zbiorek przepisà w na Ä w z ppg 1x

więcej podobnych podstron