IEEE 802.1X VLAN Assignment: Finding Feature Information
IEEE 802.1X VLAN Assignment: Finding Feature Information
1X VLAN Assignment
The IEEE 802.1X VLAN Assignment feature is automatically enabled when IEEE 802.1X authentication
is configured for an access port, which allows the RADIUS server to send a VLAN assignment to the device
port. This assignment configures the device port so that network access can be limited for certain users.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
1
IEEE 802.1X VLAN Assignment
Prerequisites for IEEE 802.1X VLAN Assignment
• The device must have a RADIUS configuration and be connected to the Cisco secure access control
server (ACS). You should understand the concepts of the RADIUS protocol and have an understanding
of how to create and apply access control lists (ACLs).
• EAP support must be enabled on the RADIUS server.
• You must configure the IEEE 802.1X supplicant to send an EAP-logoff (Stop) message to the switch
when the user logs off. If you do not configure the IEEE 802.1X supplicant, an EAP-logoff message is
not sent to the switch and the accompanying accounting Stop message is not sent to the authentication
server. See the Microsoft Knowledge Base article at the location http://support.microsoft.com and set
the SupplicantMode registry to 3 and the AuthMode registry to 1.
• Authentication, authorization, and accounting (AAA) must be configured on the port for all
network-related service requests. The authentication method list must be enabled and specified. A method
list describes the sequence and authentication method to be queried to authenticate a user. See the IEEE
802.1X Authenticator feature module for information.
• The port must be successfully authenticated.
The IEEE 802.1X VLAN Assignment feature is available only on Cisco 89x and 88x series integrated switching
routers (ISRs) that support switch ports.
The following ISR-G2 routers are supported:
• 1900
• 2900
• 3900
• 3900e
Note Not all Cisco ISR routers support all the components listed. For information about module compatibility
with a specific router platform, see Cisco EtherSwitch Modules Comparison.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
2
IEEE 802.1X VLAN Assignment
Restrictions for IEEE 802.1X VLAN Assignment
To determine whether your router has switch ports, use the show interfaces switchport command.
Note An access VLAN is a VLAN assigned to an access port. All packets sent from or received on this port
belong to this VLAN.
• Assignment to the configured access VLAN prevents ports from appearing unexpectedly in an
inappropriate VLAN because of a configuration error. Examples of configuration errors include the
following:
• A nonexistent or malformed VLAN ID
• Attempted assignment to a voice VLAN ID
• When IEEE 802.1X authentication is enabled on a port, you cannot configure a port VLAN that is equal
to a voice VLAN.
• The IEEE 802.1X authentication with VLAN assignment feature is not supported on trunk ports, dynamic
ports, or with dynamic-access port assignment through a VLAN Membership Policy Server (VMPS).
• If the multihost mode is enabled on an IEEE 802.1X port, all hosts are placed in the same VLAN
(specified by the RADIUS server) as the first authenticated host.
• If an IEEE 802.1X port is authenticated and put in the RADIUS server-assigned VLAN, any change to
the port access VLAN configuration does not take effect.
• This feature does not support standard ACLs on the switch port.
Configuring Authorization
The AAA authorization feature is used to determine what a user can and cannot do. When AAA authorization
is enabled, the network access server uses information retrieved from the user’s profile, which is located either
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
3
IEEE 802.1X VLAN Assignment
IEEE 802.1X Authentication with VLAN Assignment
in the local user database or on the security server, to configure the user’s session. Once this is done, the user
is granted access to a requested service only if the information in the user profile allows it.
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa authorization network radius if-authenticated
5. aaa authorization exec radius if-authenticated
6. end
DETAILED STEPS
Example:
Device# configure terminal
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
4
IEEE 802.1X VLAN Assignment
Enabling IEEE 802.1X Authentication and Authorization
Example:
Device(config)# aaa new-model
Step 4 aaa authorization network radius if-authenticated Configures the device for user RADIUS authorization for all
network-related service requests. RADIUS authorization
Example: succeeds if the user has authenticated.
Step 5 aaa authorization exec radius if-authenticated Configures the device for user RADIUS authorization if the
user has privileged EXEC access. RADIUS authorization
Example: succeeds if the user has authenticated.
Step 6 end Exits global configuration mode and enters privileged EXEC
mode.
Example:
Device(config)# end
1. enable
2. configure terminal
3. aaa new-model
4. aaa authentication dot1x {default | listname} method1 [method2...]
5. dot1x system-auth-control
6. identity profile default
7. interface type slot/port
8. access-session port-control {auto | force-authorized | force-unauthorized}
9. dot1x pae [supplicant | authenticator | both]
10. end
11. show dot1x
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
5
IEEE 802.1X VLAN Assignment
Enabling IEEE 802.1X Authentication and Authorization
DETAILED STEPS
Example:
Device# configure terminal
Example:
Device(config)# aaa new-model
Step 4 aaa authentication dot1x {default | Creates a series of authentication methods that are used to determine user
listname} method1 [method2...] privilege to access the privileged command level so that the device can
communicate with the AAA server.
Example:
Device(config)# aaa authentication
dot1x default group radius
Example:
Device(config)# dot1x
system-auth-control
Step 6 identity profile default Creates an identity profile and enters dot1x profile configuration mode.
Example:
Device(config)# identity profile
default
Step 7 interface type slot/port Enters interface configuration mode and specifies the interface to be enabled
for 802.1X authentication.
Example:
Device(config-identity-prof)#
interface Gigabitethernet 1/0/1
Step 8 access-session port-control {auto | Enables 802.1X port-based authentication on the interface.
force-authorized | force-unauthorized}
• auto—Enables IEEE 802.1X authentication and causes the port to
begin in the unauthorized state, allowing only EAPOL frames to be
Example: sent and received through the port. The authentication process begins
Device(config-if)# access-session
port-control auto when the link state of the port changes from down to up or when an
EAPOL-start frame is received. The Device requests the identity of
the supplicant and begins relaying authentication messages between
the supplicant and the authentication server. Each supplicant
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
6
IEEE 802.1X VLAN Assignment
Specifying an Authorized VLAN in the RADIUS Server Database
Step 10 end Exits interface configuration mode and enters privileged EXEC mode.
Example:
Device(config-if)# end
Step 11 show dot1x Displays whether 802.1X authentication has been configured on the device.
Example:
Device# show dot1x
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
7
IEEE 802.1X VLAN Assignment
Configuration Example for IEEE 802.1X VLAN Assignment
Attribute [64] must contain the value “VLAN” (type 13). Attribute [65] must contain the value “802” (type 6).
Attribute [81] specifies the VLAN name or VLAN ID assigned to the IEEE 802.1X-authenticated user.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
8
IEEE 802.1X VLAN Assignment
Example: Specifying an Authorized VLAN in the RADIUS Server Database
AdditionalReferencesforIEEE802.1XPort-BasedAuthentication
Related Documents
Security commands
• Cisco IOS Security Command Reference:
Commands A to C
• Cisco IOS Security Command Reference:
Commands D to L
• Cisco IOS Security Command Reference:
Commands M to R
• Cisco IOS Security Command Reference:
Commands S to Z
Standard/RFC Title
IEEE 802.1X Port Based Network Access Control
MIBs
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
9
IEEE 802.1X VLAN Assignment
Feature Information for IEEE 802.1X VLAN Assignment
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
10
IEEE 802.1X VLAN Assignment
Feature Information for IEEE 802.1X VLAN Assignment
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
11
IEEE 802.1X VLAN Assignment
Feature Information for IEEE 802.1X VLAN Assignment
802.1X Authentication Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
12