Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
28 views56 pages

Sec User 8021x 12 4 Book

The document is a configuration guide for Cisco IOS Release 12.4, focusing on 802.1X Authentication Services. It details how to configure Remote Site IEEE 802.1X Local Authentication Service, including setup, user group configuration, and monitoring. The guide also outlines restrictions, prerequisites, and provides examples for implementing VPN access control using 802.1X authentication.

Uploaded by

moholo1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views56 pages

Sec User 8021x 12 4 Book

The document is a configuration guide for Cisco IOS Release 12.4, focusing on 802.1X Authentication Services. It details how to configure Remote Site IEEE 802.1X Local Authentication Service, including setup, user group configuration, and monitoring. The guide also outlines restrictions, prerequisites, and provides examples for implementing VPN access control using 802.1X authentication.

Uploaded by

moholo1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

802.

1X Authentication Services
Configuration Guide Cisco IOS Release
12.4

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL
FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output,
network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content
is unintentional and coincidental.

© 2012 Cisco Systems, Inc. All rights reserved.


CONTENTS

Remote Site IEEE 802.1X Local Authentication Service 1


Finding Feature Information 1
Restrictions for Configuring Remote Site IEEE 802.1X Local Authentication Service 1
Information About Configuring Remote Site IEEE 802.1X Local Authentication Service 2
How to Configure Remote Site IEEE 802.1X Local Authentication Service 3
Configuring the Local Authentication Server 3
Configuring User Groups on the Local Authentication Server 5
Unblocking Usernames 6
Creating the User List on the Local Authentication Server 6
Saving the Configuration on the Local Authentication Server 6
Configuring Access Points or Routers to Use the Local Authentication Server 7
Verifying the Configuration for Local Authentication Service 9
Monitoring and Maintaining 802.1X Local Authentication Service 9
Configuration Examples for Remote Site IEEE 802.1X Local Authentication Service 9
Setting Up a Local Authentication Server Example 10
Setting Up Two Main Servers and a Local Authentication Server Example 10
Displaying Local Authentication Server Configuration Example 11
Displaying Local Authentication Server Statistics Example 12
Additional References 13
Feature Information for Remote Site IEEE 802.1X Local Authentication Service 14
VPN Access Control Using 802.1X Authentication 17
Finding Feature Information 17
Prerequisites for VPN Access Control Using 802.1X Authentication 17
Restrictions for VPN Access Control Using 802.1X Authentication 18
Information About VPN Access Control Using 802.1X Authentication 18
How VPN Control Using 802.1X Authentication Works 18
802.1X Authentication Sample Topology and Configuration 19
Converged 802.1X Authenticator Support 19
802.1X Supplicant Support 19

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


iii
Contents

Converged 802.1X Supplicant Support 20


Authentication Using Passwords and MD5 20
How to Configure VPN Access Control Using 802.1X Authentication 21
Configuring a AAA RADIUS Server 21
Configuring a Router 21
Enabling 802.1X Authentication 22
Configuring Router and RADIUS Communication 24
Configuring 802.1X Parameters Retransmissions and Timeouts 25
Configuring the Identity Profile 28
Configuring the Identity Profile 30
Configuring the DHCP Private Pool 31
Configuring the DHCP Public Pool 32
Configuring the Interface 33
Configuring an Interface Without Assigning an Explicit IP Address to the Interface 34
Configuring the Necessary Access Control Policies 36
Configuring a PC As an 802.1X Supplicant 36
Configuring a PC for VPN Access Control Using 802.1X Authentication 36
Enabling 802.1X Authentication on a Windows 2000 XP PC 36
Enabling 802.1X Authentication on a Windows 2000 PC 37
Enabling 802.1X Authentication on a Windows XP PC 37
Enabling 802.1X Authentication on Windows 2000 and Windows XP PCs 38
Configuring a Router As an 802.1X Supplicant 39
Troubleshooting Tips 41
Monitoring VPN Access Control Using 802.1X Authentication 41
Verifying VPN Access Control Using 802.1X Authentication 42
Configuration Examples for VPN Access Control Using 802.1X Authentication 43
Typical VPN Access Control Using 802.1X Configuration Example 44
Access Control Policies Example 47
Additional References 48
Feature Information for VPN Access Control Using 802.1X Authentication 50

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


iv
Remote Site IEEE 802.1X Local Authentication
Service
The Remote Site IEEE 802.1X Local Authentication Service feature provides the ability to configure an
access point or wireless-aware router to act as a local RADIUS server. Configuring local authentication
service provides a backup authentication service in the event of a WAN link or server failure.

• Finding Feature Information, page 1


• Restrictions for Configuring Remote Site IEEE 802.1X Local Authentication Service, page 1
• Information About Configuring Remote Site IEEE 802.1X Local Authentication Service, page 2
• How to Configure Remote Site IEEE 802.1X Local Authentication Service, page 3
• Monitoring and Maintaining 802.1X Local Authentication Service, page 9
• Configuration Examples for Remote Site IEEE 802.1X Local Authentication Service, page 9
• Additional References, page 13
• Feature Information for Remote Site IEEE 802.1X Local Authentication Service, page 14

Finding Feature Information


Your software release may not support all the features documented in this module. For the latest feature
information and caveats, see the release notes for your platform and software release. To find information
about the features documented in this module, and to see a list of the releases in which each feature is
supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

Restrictions for Configuring Remote Site IEEE 802.1X Local


Authentication Service
• The local authentication server does not synchronize its database with the main RADIUS servers. It is
necessary to manually configure the local authentication server with client usernames and passwords.
• LEAP is the only supported authentication protocol.
• Although multiple local authentication servers can exist on one network, only one authentication
server can be configured on any single device.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


1
Remote Site IEEE 802.1X Local Authentication Service
Information About Configuring Remote Site IEEE 802.1X Local Authentication Service

Information About Configuring Remote Site IEEE 802.1X Local


Authentication Service
On typical wireless LANs that use 802.1X authentication, access points and wireless-aware routers rely on
remote site RADIUS servers to authenticate client devices. This authentication traffic must cross a WAN
link. If the WAN link fails, or if the access points and routers cannot reach the RADIUS servers, then the
client devices cannot access the wireless network even if their requirements for access are strictly local.
To provide for local authentication service or backup authentication service in the event of a WAN link or
server failure, you can configure an access point or wireless-aware router to act as a local RADIUS server.
The access point or wireless-aware router can authenticate Light Extensible Authentication Protocol
(LEAP)-enabled wireless client devices and allow them to join your network.
Because the local authentication device does not synchronize its database with the main RADIUS servers.
You must configure the local authentication server with client usernames and passwords. The local
authentication server also permits you to specify a VLAN and a list of service set identifiers (SSIDs) that a
client is allowed to use.
Follow these guidelines when you configure an access point or wireless-aware router as a local
authentication server:
• To prevent performance degradation, configure local authentication service on an access point or a
wireless-aware router that does not have a high CPU load.
• Physically secure the access point or router to protect its configuration.
The table below shows the maximum number of clients that can be configured on a local authentication
server.

Table 1 Maximum Number of Clients That Can be Configured on a Local Authentication Server

Local Authentication Server Maximum Number of Clients


Cisco Aironet Access Point 1100 and Cisco Aironet 50
Access Point 1200

Cisco 2610XM, Cisco 2611XM routers 50

Cisco 2620XM, Cisco 2621XM routers 50

Cisco 2650XM, Cisco 2651XM routers 50

Cisco 2691 routers 50

Cisco 2811 routers 50

Cisco 2821 routers 50

Cisco 2851 routers 50

Cisco 3725 routers 50

Cisco 3745 routers 50

Cisco 3825 routers 50

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


2
Configuring the Local Authentication Server
How to Configure Remote Site IEEE 802.1X Local Authentication Service

Local Authentication Server Maximum Number of Clients


Cisco 3845 routers 50

Note Users that are associated to the local authentication server might notice a drop in performance during
authentication of client devices. However, if your wireless LAN contains only one access point, you can
configure that device as both the 802.1X authenticator and the local authentication server.

You configure access points and routers to use the local authentication server when they cannot reach the
main servers or when a RADIUS server is not available.
The access points and wireless-aware routers stop using the local authentication server automatically when
the link to the main servers is restored.
If your local authentication server also serves client devices, you must enter the local authentication server
access point or router as a network access server (NAS). When a LEAP client associates to the local
authentication server access point, the access point uses itself to authenticate the client.

Caution The access point or wireless-aware router that you use as an authentication server contains detailed
authentication information about your wireless LAN, so you should secure it physically to protect its
configuration.

How to Configure Remote Site IEEE 802.1X Local


Authentication Service
• Configuring the Local Authentication Server, page 3
• Configuring User Groups on the Local Authentication Server, page 5
• Creating the User List on the Local Authentication Server, page 6
• Saving the Configuration on the Local Authentication Server, page 6
• Configuring Access Points or Routers to Use the Local Authentication Server, page 7
• Verifying the Configuration for Local Authentication Service, page 9

Configuring the Local Authentication Server


Perform this task to configure the access point as a local authentication server.

SUMMARY STEPS

1. Router> enable
2. Router# configure terminal
3. Router(config)# aaa new-model
4. Router(config)# radius-server local
5. Router(config-radsrv)# nas ip-address key shared-key

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


3
Remote Site IEEE 802.1X Local Authentication Service
How to Configure Remote Site IEEE 802.1X Local Authentication Service

DETAILED STEPS

Command or Action Purpose


Step 1 Router> enable Enables privileged EXEC mode.

Example:

Router> enable

Step 2 Router# configure terminal Enters global configuration mode.

Example:

Router# configure terminal

Step 3 Router(config)# aaa new-model Enables AAA.

Example:

Router(config)# aaa new-model

Step 4 Router(config)# radius-server local Enables the access point or router as a local authentication server and
enters configuration mode for the authentication server.

Example:

Router(config)# radius-server local

Step 5 Router(config-radsrv)# nas ip-address key Adds an access point or wireless domain services (WDS) device to the list
shared-key of units that use the local authentication server. Enter the IP address of the
access point or WDS device, and the shared key used to authenticate
communication between the local authentication server and other access
Example: points. You must enter this shared key on the WDS devices that use the
local authentication server. Each access point and candidate WDS that uses
Router(config)# nas 192.168.12.17 key the local authentication server is a network access server (NAS).
shared256
If an access point is the local authentication server that also serves client
devices, you must enter the local authentication server access point as a
Example: NAS.
Note Leading spaces in the key string are ignored, but spaces within and
at the end of the key are used. If you use spaces in your key, do not
enclose the key in quotation marks unless the quotation marks are
part of the key.
Repeat this step to add each access point and candidate WDS device that
uses the local authentication server.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


4
Configuring User Groups on the Local Authentication Server
How to Configure Remote Site IEEE 802.1X Local Authentication Service

Configuring User Groups on the Local Authentication Server


Perform this optional task (beginning in local RADIUS server configuration mode) to configure user
groups on the local authentication server.

Note If you do not wish to configure user groups on the local authentication server, skip this task and go to the
Creating the User List on the Local Authentication_Server module.

SUMMARY STEPS

1. Router(config-radsrv)# group group-name


2. Router(config-radsrv-group)# vlan vlan
3. Router(config-radsrv-group)# ssid ssid
4. Router(config-radsrv-group)# reauthentication time seconds
5. Router(config-radsrv-group)# block countcounttime {seconds | infinite}
6. Router(config-radsrv-group)# exit

DETAILED STEPS

Command or Action Purpose


Step 1 Router(config-radsrv)# group Enters user group configuration mode and configures a user group to which you can
group-name assign shared settings.

Step 2 Router(config-radsrv-group)# (Optional) Specifies a VLAN to be used by members of the user group. The access point
vlan vlan moves group members into that VLAN, overriding other VLAN assignments. You can
assign only one VLAN to the group.

Step 3 Router(config-radsrv-group)# (Optional) Enters up to 20 service set identifiers (SSIDs) to limit members of the user
ssid ssid group to those SSIDs. The access point checks whether the client’s SSID matches an
SSID in the list. If the SSID does not match, the client is disassociated.

Step 4 Router(config-radsrv-group)# (Optional) Configures the number of seconds after which access points should
reauthentication time reauthenticate members of the group. The reauthentication provides users with a new
seconds encryption key. The default setting is 0, which means that group members are never
required to reauthenticate.

Step 5 Router(config-radsrv-group)# (Optional) To help protect against password-guessing attacks, you can lock out group
block countcounttime members for a length of time after a set number of incorrect passwords.
{seconds | infinite}
• Count--The number of failed passwords that triggers a lockout of the username.
• Time--The number of seconds that the lockout should last. If you enter infinite, an
administrator must manually unblock the locked username. For more information,
see the Unblocking Usernames module.

Step 6 Router(config-radsrv-group)# Returns to authenticator configuration mode.


exit

• Unblocking Usernames, page 6

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


5
Creating the User List on the Local Authentication Server
Unblocking Usernames

Unblocking Usernames
You can unblock usernames before the lockout time expires or when the lockout time is set to infinite. To
unblock a locked username, enter the following command in privileged EXEC mode on the local
authentication server.

Router# clear radius local-server user username

Creating the User List on the Local Authentication Server


Perform the required task described in the following paragraphs to create a user list on the local
authentication server and to configure the users that are allowed to authenticate using the local
authentication server.

Note If you do not wish to configure users on the local authentication server, skip this task and go to the Saving
the Configuration on the Local Authentication Server module.

You must enter a username and password for each user. If you know only the NT hash value of the
password, which you can often find in the authentication server database, you can enter the NT hash as a
string of hexadecimal digits.
To add the user to a user group, enter the group name. If you do not specify a group, the user is not
assigned to a specific VLAN and is never forced to reauthenticate.
Beginning in local RADIUS server configuration mode, enter the user command for each username:

Router(config-radsrv)# user
username {password
| nthash
} password [group
group-name]

Saving the Configuration on the Local Authentication Server


Perform this optional task to save the current configuration.

SUMMARY STEPS

1. Router(config-radsrv)# end
2. Router# copy running-config startup-config

DETAILED STEPS

Command or Action Purpose


Step 1 Router(config-radsrv)# end Returns to privileged EXEC mode.

Step 2 Router# copy running-config startup-config Saves your entries in the configuration file.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


6
Configuring Access Points or Routers to Use the Local Authentication Server
Unblocking Usernames

Configuring Access Points or Routers to Use the Local Authentication


Server
Perform this required task to add the local authentication server to the list of servers on the client access
point or wireless-aware router.

Note If your local authentication server access point also serves client devices, you must configure the local
authentication server to use itself to authenticate client devices.

On the wireless devices that use the local authentication server, use the radius-server host command in
privileged EXEC mode to enter the local authentication server as a RADIUS server. The order in which the
devices attempt to use the servers matches the order in which you enter the servers in the device
configuration. If you are configuring the device to use a RADIUS server for the first time, enter the main
RADIUS servers first, and enter the local authentication server last.

Note You must enter 1812 as the authentication port and 1813 as the accounting port. The local authentication
server listens on User Datagram Protocol (UDP) port 1813 for RADIUS accounting packets. It discards the
accounting packets but sends acknowledge packets back to the RADIUS clients to prevent the clients from
reacting as though the server is down.

Use the radius-server deadtime command in global configuration mode to set an interval during which the
access point or router does not attempt to use servers that do not respond, thus avoiding the wait for a
request to time out before trying the next configured server. A server marked as dead is skipped by
additional requests for the duration of minutes that you specify, up to 1440 (24 hours).
To remove the local authentication server from the access point or router configuration, use the no radius-
server host command in global configuration mode.

SUMMARY STEPS

1. Router> enable
2. Router# configure terminal
3. Router(config)# aaa new-model
4. Router(config)# radius-server host {hostname | ip-address } [auth-portport-number ] [acct-portport-
number ] [timeoutseconds ] [retransmitretries ] [keystring ]
5. aaa group server {radius | tacacs+} group-name
6. Router(config-sg-radius)# server ip-address auth-port 1812 acct-port 1813
7. Router(config)# aaa authentication loginnamed-authentication-list
8. Router(config)# end
9. Router# show running-config
10. Router# copy running-config startup-config

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


7
Remote Site IEEE 802.1X Local Authentication Service
Unblocking Usernames

DETAILED STEPS

Command or Action Purpose


Step 1 Router> enable Enables privileged EXEC mode.

Step 2 Router# configure terminal Enters global configuration mode.

Step 3 Router(config)# aaa new-model Enables authentication, authorization, and accounting (AAA). This step must
be configured before the rest of the AAA configuration steps.

Step 4 Router(config)# radius-server host Specifies the IP address or hostname of the remote RADIUS server host.
{hostname | ip-address } [auth-portport-
• (Optional) For auth-port port-number, specify the UDP destination port
number ] [acct-portport-number ]
for authentication requests.
[timeoutseconds ] [retransmitretries ]
[keystring ] • (Optional) For acct-port port-number, specify the UDP destination port
for accounting requests.
• (Optional) For timeoutseconds , specify the time interval that the access
point waits for the RADIUS server to reply before retransmitting. The
range is 1 to 1000. This setting overrides the setting made using the
radius-server timeout command in global configuration mode. If no
timeout is set with the radius-server host command, the setting made
using the radius-server timeout command is used.
• (Optional) For retransmitretries , specify the number of times that a
RADIUS request is re-sent to a server if that server is not responding or
is responding slowly. The range is 1 to 1000. If no retransmit value is set
using the radius-server host command, the setting made using the
radius-server retransmit command in global configuration command
mode is used.
• (Optional) For keystring , specify the authentication and encryption key
used between the access point and the RADIUS daemon running on the
RADIUS server.
Note The key is a text string that must match the encryption key used on the
RADIUS server. Always configure the key as the last item in the
radius-server hostcommand. Leading spaces are ignored, but spaces
within and at the end of the key are used. If you use spaces in your key,
do not enclose the key in quotation marks unless the quotation marks
are part of the key.
To configure the access point to recognize more than one host entry
associated with a single IP address, enter this command as many times as
necessary, making sure to use a different UDP port number for each host. The
access point software searches for hosts in the order in which you specify
them. Set the timeout, retransmit, and encryption key values to use with the
specific RADIUS host.

Step 5 aaa group server {radius | tacacs+} Defines the AAA server-group with a group name.
group-name
Step 6 Router(config-sg-radius)# server ip- Defines the AAA server IP address, authentication port, and accounting port.
address auth-port 1812 acct-port 1813

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


8
Verifying the Configuration for Local Authentication Service
Monitoring and Maintaining 802.1X Local Authentication Service

Command or Action Purpose


Step 7 Router(config)# aaa authentication Creates an authentication method list for the server group.
loginnamed-authentication-list
Step 8 Router(config)# end Returns to privileged EXEC mode.

Step 9 Router# show running-config Displays the current configuration for your verification.

Step 10 Router# copy running-config startup- (Optional) Saves your entries in the configuration file.
config

Verifying the Configuration for Local Authentication Service


Use the show running-config command in global configuration mode to verify the current configuration
for local authentication service.

SUMMARY STEPS

1. Router> enable
2. Router# show running-config

DETAILED STEPS

Command or Action Purpose


Step 1 Router> enable Enables privileged EXEC mode.

Step 2 Router# show running-config Displays the current access point operating configuration

Monitoring and Maintaining 802.1X Local Authentication


Service
To view statistics collected by the local authentication server, enter the following command in privileged
EXEC mode:

Router# show radius local-server statistics

To reset local authentication server statistics to zero, enter the following command in privileged EXEC
mode:

Router# clear radius local-server statistics

Configuration Examples for Remote Site IEEE 802.1X Local


Authentication Service
• Setting Up a Local Authentication Server Example, page 10

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


9
Setting Up a Local Authentication Server Example
Configuration Examples for Remote Site IEEE 802.1X Local Authentication Service

• Setting Up Two Main Servers and a Local Authentication Server Example, page 10
• Displaying Local Authentication Server Configuration Example, page 11
• Displaying Local Authentication Server Statistics Example, page 12

Setting Up a Local Authentication Server Example


This example shows how to set up a local authentication server used by three access points with three user
groups and several users:

AP# configure terminal


AP(config)# aaa new-model
AP(config)# aaa group server radius RADIUS_SERVER_GROUP
AP(config-sg-radius)# server 10.0.0.1 auth-port 1812 acct-port 1813
AP(config)# aaa authentication login RADIUS_METHOD_LIST
AP(config)# radius-server host 10.0.0.1 auth-port 1812 acct-port 1813 key 110337
AP(config)# radius-server local
AP(config-radsrv)# nas 10.91.6.159 key 110337
AP(config-radsrv)# nas 10.91.6.162 key 110337
AP(config-radsrv)# nas 10.91.6.181 key 110337
AP(config-radsrv)# group clerks
AP(config-radsrv-group)# vlan 87
AP(config-radsrv-group)# ssid batman
AP(config-radsrv-group)# ssid robin
AP(config-radsrv-group)# reauthentication time 1800
AP(config-radsrv-group)# block count 2 time 600
AP(config-radsrv-group)# group cashiers
AP(config-radsrv-group)# vlan 97
AP(config-radsrv-group)# ssid deer
AP(config-radsrv-group)# ssid antelope
AP(config-radsrv-group)# ssid elk
AP(config-radsrv-group)# reauthentication time 1800
AP(config-radsrv-group)# block count 2 time 600
AP(config-radsrv-group)# group managers
AP(config-radsrv-group)# vlan 77
AP(config-radsrv-group)# ssid mouse
AP(config-radsrv-group)# ssid chipmunk
AP(config-radsrv-group)# reauthentication time 1800
AP(config-radsrv-group)# block count 2 time 600
AP(config-radsrv-group)# exit
AP(config-radsrv)# user jsmith password twain74 group clerks
AP(config-radsrv)# user stpatrick password snake100 group clerks
AP(config-radsrv)# user nick password uptown group clerks
AP(config-radsrv)# user sam password rover32 group cashiers
AP(config-radsrv)# user patsy password crowder group cashiers
AP(config-radsrv)# user carl password 272165 group managers
AP(config-radsrv)# user vic password lid178 group managers
AP(config-radsrv)# end

Setting Up Two Main Servers and a Local Authentication Server Example


This example shows how to set up two main servers and a local authentication server with a server
deadtime of 10 minutes:

Router(config)# aaa new-model


Router(config)# aaa group server radius RADIUS_SERVER_GROUP
Router(config-sg-radius)# server 172.20.0.1 auth-port 1000 acct-port 1001
Router(config-sg-radius)# server 172.10.0.1 auth-port 1645 acct-port 1646
Router(config-sg-radius)# server 10.91.6.151 auth-port 1812 acct-port 1813
Router(config)# radius-server host 172.20.0.1 auth-port 1000 acct-port 1001 key 77654
Router(config)# radius-server host 172.10.0.1 auth-port 1645 acct-port 1646
key 77654
Router(config)# radius-server host 10.91.6.151
auth-port 1812 acct-port 1813 key
110337
Router(config)# radius-server deadtime 10

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


10
Displaying Local Authentication Server Configuration Example
Configuration Examples for Remote Site IEEE 802.1X Local Authentication Service

In this example, if the WAN link to the main servers fails, the access point or wireless-aware router
completes these steps when a LEAP-enabled client device associates:
1 It tries the first server, times out multiple times, and marks the first server as dead.
2 It tries the second server, times out multiple times, and marks the second server as dead.
3 It tries and succeeds using the local authentication server.
If another client device needs to authenticate during the 10-minute deadtime interval, the access point skips
the first two servers and tries the local authentication server first. After the deadtime interval, the access
point tries to use the main servers for authentication. When setting a deadtime, you must balance the need
to skip dead servers with the need to check the WAN link and begin using the main servers again as soon as
possible.
Each time an access point or wireless-aware router tries to use the main servers while they are down, the
client device that is trying to authenticate might report an authentication timeout. The client device retries
and succeeds when the main servers time out and the access point or wireless-aware router tries the local
authentication server. You can extend the timeout value on Cisco client devices to accommodate expected
server timeouts.

Displaying Local Authentication Server Configuration Example


The following is sample output for configuration of a local authentication server on the Cisco 2621 router.

2621-1# show run


Building configuration...
Current configuration : 2954 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname 2621-1
!
!
aaa new-model
!
!
aaa group server radius RADIUS_LEAP_GROUP
server 10.0.0.1 auth-port 1812 acct-port 1813
!
aaa authentication login AUTH_LEAP group RADIUS_LEAP_GROUP
aaa session-id common
ip subnet-zero
!
!
ip dhcp pool 2621-dhcp-pool
network 10.0.0.0 255.0.0.0
!
!
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet1/0
no ip address

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


11
Displaying Local Authentication Server Statistics Example
Configuration Examples for Remote Site IEEE 802.1X Local Authentication Service

!
interface FastEthernet1/1
switchport mode trunk
no ip address
!
interface FastEthernet1/2
no ip address
shutdown
!
interface FastEthernet1/3
no ip address
shutdown
!
interface FastEthernet1/4
no ip address
shutdown
!
interface FastEthernet1/5
no ip address
!
!
interface GigabitEthernet1/0
no ip address
shutdown
!
interface Vlan1
ip address 10.0.0.1 255.0.0.0
!
ip classless
!
ip http server
no ip http secure-server
!
!
!
radius-server local
nas 10.0.0.1 key 0 cisco
user ap-1 nthash 7 101B2A415547345A5F25790801706510064152425325720D7D04075D523D4F780A
user ap-5 nthash 7 144231535C540C7A77096016074B51332753030D0877705A264F450A09720A7307
user user1 nthash 7 1350344A5B5C227B78057B10107A452232515402097C77002B544B45087D0E7200
!
radius-server host 10.0.0.1 auth-port 1812 acct-port 1813
radius-server key cisco
!
wlccp authentication-server infrastructure AUTH_LEAP
wlccp authentication-server client leap AUTH_LEAP
wlccp wds priority 255 interface Vlan1
!
line con 0
line aux 0
line vty 0 4
!
!
!
end

Displaying Local Authentication Server Statistics Example


The following is sample output for configuration for the show radius local-server statistics command:

router-2621-1# show radius local-server statistics


Successes : 11262 Unknown usernames : 0
Client blocks : 0 Invalid passwords : 8
Unknown NAS : 0 Invalid packet from NAS: 0
NAS : 10.0.0.1
Successes : 11262 Unknown usernames : 0
Client blocks : 0 Invalid passwords : 8
Corrupted packet : 0 Unknown RADIUS message : 0
No username attribute : 0 Missing auth attribute : 0
Shared key mismatch : 0 Invalid state attribute: 0
Unknown EAP message : 0 Unknown EAP auth type : 0

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


12
Remote Site IEEE 802.1X Local Authentication Service
Additional References

Maximum number of configurable users: 50, current user count: 11


Username Successes Failures Blocks
vayu-ap-1 2235 0 0
vayu-ap-2 2235 0 0
vayu-ap-3 2246 0 0
vayu-ap-4 2247 0 0
vayu-ap-5 2247 0 0
vayu-11 3 0 0
vayu-12 5 0 0
vayu-13 5 0 0
vayu-14 30 0 0
vayu-15 3 0 0
scm-test 1 8 0
router-2621-1#

The first section shows cumulative statistics from the local authentication server. The second section shows
statistics for each access point (NAS) that is authorized to use the local authentication server. The third
section shows statistics for individual users. If a user is blocked and the lockout time is set to infinite,
Blocked appears at the end of the line of statistics for that user. If the lockout time is not set to infinite,
Unblocked in x seconds appears at the end of the statistics line for that user.

Additional References
Related Documents

Related Topic Document Title


Comprehensive set of software configuration Cisco IOS Software Configuration Guide for Cisco
commands Aironet Access Points

Configuration commands for wireless roaming Configuring Fast Secure Roaming

MIBs

MIB MIBs Link


Non. To locate and download MIBs for selected
platforms, Cisco IOS releases, and feature sets, use
Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


13
Remote Site IEEE 802.1X Local Authentication Service
Feature Information for Remote Site IEEE 802.1X Local Authentication Service

Technical Assistance

Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.

Feature Information for Remote Site IEEE 802.1X Local


Authentication Service
The following table provides release information about the feature or features described in this module.
This table lists only the software release that introduced support for a given feature in a given software
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

Table 2 Feature Information for Remote Site IEEE 802.1X Local Authentication Service

Feature Name Releases Feature Information


Remote Site IEEE 802.1X Local 12.2(11)JA 12.3(11)T The Remote Site IEEE 802.1X
Authentication Service Local Authentication Service
feature provides the ability to
configure an access point or
wireless-aware router to act as a
local RADIUS server.
Configuring local authentication
service provides a backup
authentication service in the event
of a WAN link or server failure.
This feature was introduced in
Cisco IOS Release 12.2(11)JA on
Cisco Aironet access points.
This feature was integrated in
Cisco IOS Release 12.3(11)T on
the Cisco 2600XM, Cisco 2691,
Cisco 2811, Cisco 2821, Cisco
2851, Cisco 3700 series, and
Cisco 3800 series routers.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


14
Remote Site IEEE 802.1X Local Authentication Service

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


15
Displaying Local Authentication Server Statistics Example

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


16
VPN Access Control Using 802.1X
Authentication
The home access router provides connectivity to the corporate network through a Virtual Private Network
(VPN) tunnel through the Internet. In the home LAN, apart from the employee, other members of the
household may also be using the same access router. The VPN Access Control Using 802.1X
Authentication feature allows enterprise employees to access their enterprise networks from home while
allowing other household members to access only the Internet. The feature uses the IEEE 802.1X protocol
framework to achieve the VPN access control. The authenticated employee has access to the VPN tunnel
and others (unauthenticated users on the same LAN) have access only to the Internet.
An authentication manager has been added to allow more flexible authentication between different
authentication methods like, dot1x, MAC address bypass, and web authentication. See the 802.1X
Flexible Authentication feature for more information.

• Finding Feature Information, page 17


• Prerequisites for VPN Access Control Using 802.1X Authentication, page 17
• Restrictions for VPN Access Control Using 802.1X Authentication, page 18
• Information About VPN Access Control Using 802.1X Authentication, page 18
• How to Configure VPN Access Control Using 802.1X Authentication, page 21
• Configuration Examples for VPN Access Control Using 802.1X Authentication, page 43
• Additional References, page 48
• Feature Information for VPN Access Control Using 802.1X Authentication, page 50

Finding Feature Information


Your software release may not support all the features documented in this module. For the latest feature
information and caveats, see the release notes for your platform and software release. To find information
about the features documented in this module, and to see a list of the releases in which each feature is
supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

Prerequisites for VPN Access Control Using 802.1X


Authentication

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


17
How VPN Control Using 802.1X Authentication Works
Restrictions for VPN Access Control Using 802.1X Authentication

• The PCs connecting behind the router should have 802.1X clients running on them.
• You should know how to configure authentication, authorization, and accounting (AAA) and
RADIUS.
• You should be familiar with IP Security (IPSec).
• You should be familiar with Dynamic Host Configuration Protocol (DHCP).
• You should know how to configure user lists on a Cisco access control server (ACS).

Restrictions for VPN Access Control Using 802.1X


Authentication
• Easy VPN is not supported.
• VLAN interfaces are currently not supported.
• If there is a switch located between the router and the supplicant (client PC), the Extensible
Authentication Protocol over LAN (EAPOL) frames will not reach the router because the switch
discards them.

Information About VPN Access Control Using 802.1X


Authentication
• How VPN Control Using 802.1X Authentication Works, page 18
• Authentication Using Passwords and MD5, page 20

How VPN Control Using 802.1X Authentication Works


The home access router provides connectivity to the corporate network through a VPN tunnel through the
Internet. In the home LAN, both authenticated (employee) and unauthenticated (other household members)
users exist, and both have access to the corporate VPN tunnel. Currently there is no existing mechanism to
prevent the unauthenticated user from accessing the VPN tunnel.
To distinguish between the users, the VPN Access Control Using 802.1X Authentication feature uses the
IEEE 802.1X protocol that allows end hosts to send user credentials on Layer 2 of the network operating
system. Unauthenticated traffic users will be allowed to pass through the Internet but will be blocked from
accessing the corporate VPN tunnel. The VPN Access Control Using 802.1X feature expands the scope of
the 802.1X standard to authenticate devices rather than ports, meaning that multiple devices can be
independently authenticated for any given port. This feature separates traffic from authenticated and
unauthenticated users so that separate access policies can be applied.
When an 802.1X-capable host starts up, it will initiate the authentication phase by sending the EAPOL-
Start 802.1X protocol data unit (PDU) to the reserved IEEE multicast MAC address (01-80-C2-00-00-03)
with the Ethernet type or length set to 0x888E.
All 802.1X PDUs will be identified as such by the Ethernet driver and will be enqueued to be handled by
an 802.1X process. On some platforms, Ethernet drivers have to program the interface address filter so that
EAPOL packets can be accepted.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


18
VPN Access Control Using 802.1X Authentication
802.1X Authentication Sample Topology and Configuration

On the router, the receipt of the EAPOL-Start message will result in the source MAC address being
“remembered,” and an EAPOL-request or identity PDU being sent to the host. The router will send all host-
addressed PDUs to the individual MAC address of the host rather than to the multicast address.
• 802.1X Authentication Sample Topology and Configuration, page 19
• Converged 802.1X Authenticator Support, page 19
• 802.1X Supplicant Support, page 19
• Converged 802.1X Supplicant Support, page 20

802.1X Authentication Sample Topology and Configuration


The figure below illustrates a typical scenario in which VPN access control using 802.1X authentication is
in place.

Figure 1 Typical 802.1X Authentication Setup

In the figure above, all the PCs are 802.1X capable hosts, and the Cisco router is an authenticator. All the
PCs are connected to the built-in hub or to an external hub. If a PC does not support 802.1X authentication,
MAC-based authentication is supported on the Cisco router. You can have any kind of connectivity or
network beyond the Cisco router WAN.

Note If there is a switch located between the router and the supplicant (client PC), the EAPOL frames will not
reach the router because the switch discards them.

• A supplicant is an entity at one end of a point-to-point LAN segment that is being authenticated by an
authenticator that is attached to the other end of that link.

Converged 802.1X Authenticator Support


The Cisco IOS commands in Cisco IOS Release 12.4(6)T for 802.1X authenticators have been standardized
to work the same way on various Cisco IOS platforms.

802.1X Supplicant Support


There are deployment scenarios in which a network device (a router acting as an 802.1X authenticator) is
placed in an unsecured location and cannot be trusted as an authenticator. This scenario requires that a

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


19
Authentication Using Passwords and MD5
Converged 802.1X Supplicant Support

network device be able to authenticate itself against another network device. The 802.1X supplicant
support functionality provides the following solutions for this requirement:
• An Extensible Authentication Protocol (EAP) framework has been included so that the supplicant has
the ability to “understand” and “respond” to EAP requests. EAP-Message Digest 5 (EAP-MD5) is
currently supported.
• Two network devices that are connected through an Ethernet link can act as a supplicant and as an
authenticator simultaneously, thus providing mutual authentication capability.
• A network device that is acting as a supplicant can authenticate itself with more than one authenticator
(that is, a single port on a supplicant can be connected to multiple authenticators).
The following illustration is an example of 802.1X supplicant support. The illustration shows that a single
supplicant port has been connected to multiple authenticators. Router A is acting as an authenticator to
devices that are sitting behind it on the LAN while those devices are acting as supplicants. At the same
time, Router B is an authenticator to Router A (which is acting as a supplicant). The RADIUS server is
located in the enterprise network.
When Router A tries to authenticate devices on the LAN, it needs to “talk” to the RADIUS server, but
before it can allow access to any of the devices that are sitting behind it, it has to prove its identity to
Router B. Router B checks the credential of Router A and gives access.

Figure 2 Multiple Instances of Supplicant Support

Converged 802.1X Supplicant Support


The Cisco IOS commands in Cisco IOS Release 12.4(6)T for 802.1X supplicants have been standardized to
work the same way on various Cisco IOS platforms. See the Configuring a Router As an 802.1X Supplicant
module.

Authentication Using Passwords and MD5


For information about using passwords and Message Digest 5 (MD5), see the following document on
Cisco.com:
• Improving Security on Cisco Routers

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


20
Configuring a AAA RADIUS Server
How to Configure VPN Access Control Using 802.1X Authentication

How to Configure VPN Access Control Using 802.1X


Authentication
• Configuring a AAA RADIUS Server, page 21
• Configuring a Router, page 21
• Configuring a PC As an 802.1X Supplicant, page 36
• Configuring a Router As an 802.1X Supplicant, page 39
• Monitoring VPN Access Control Using 802.1X Authentication, page 41
• Verifying VPN Access Control Using 802.1X Authentication, page 42

Configuring a AAA RADIUS Server


To configure an AAA RADIUS server, perform the following steps.

SUMMARY STEPS

1. Configure entries for the network access server and associated shared secrets.
2. Add the username and configure the password of the user.
3. Configure a global or per-user authentication scheme.

DETAILED STEPS

Step 1 Configure entries for the network access server and associated shared secrets.
Note The AAA server can be FreeRADIUS or Cisco Secure ACS or any other similar product with 802.1X support.

Step 2 Add the username and configure the password of the user.
Step 3 Configure a global or per-user authentication scheme.

Configuring a Router
• Enabling 802.1X Authentication, page 22
• Configuring Router and RADIUS Communication, page 24
• Configuring 802.1X Parameters Retransmissions and Timeouts, page 25
• Configuring the Identity Profile, page 28
• Configuring the Identity Profile, page 30
• Configuring the DHCP Private Pool, page 31
• Configuring the DHCP Public Pool, page 32
• Configuring the Interface, page 33
• Configuring an Interface Without Assigning an Explicit IP Address to the Interface, page 34
• Configuring the Necessary Access Control Policies, page 36

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


21
VPN Access Control Using 802.1X Authentication
Enabling 802.1X Authentication

Enabling 802.1X Authentication


To enable 802.1X port-based authentication, you should configure the router so that it can communicate
with the AAA server, enable 802.1X globally, and enable 802.1X on the interface. To enable 802.1X port-
based authentication, perform the following steps.

SUMMARY STEPS

1. enable
2. configure terminal
3. aaa new-model
4. aaa authentication dot1x {default | listname} method1 [method2...]
5. dot1x system-auth-control
6. identity profile default
7. interface type slot / port
8. dot1x port-control auto

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router> enable

Step 2 configure terminal Enters global configuration mode.

Example:

Router# configure terminal

Step 3 aaa new-model Enables AAA.

Example:

Router (config)# aaa new-model

Step 4 aaa authentication dot1x {default | listname} method1 Creates a series of authentication methods that are
[method2...] used to determine user previlege to access the
privileged command level.

Example:

Router (config)# aaa authentication dot1x default


group radius

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


22
VPN Access Control Using 802.1X Authentication
Enabling 802.1X Authentication

Command or Action Purpose


Step 5 dot1x system-auth-control Globally enables 802.1X port-based authentication.

Example:

Router (config)# dot1x system-auth-control

Step 6 identity profile default Creates an identity profile and enters dot1x profile
configuration mode.

Example:

Router (config)# identity profile default

Step 7 interface type slot / port Enters interface configuration mode and specifies the
interface to be enabled for 802.1X port-based
authentication.
Example:

Router (config-identity-prof)# interface fastethernet


0/1

Step 8 dot1x port-control auto Enables 802.1X port-based authentication on the


interface.

Example:

Router (config-if)# dot1x port-control auto

Examples
The following example shows that 802.1X authentication has been configured on a router:

Router# configure terminal


Router(config)# aaa new-model
Router(config)# aaa authentication dot1x default group radius group radius
Router(config)# dot1x system-auth-control
Router(config)# interface fastethernet 1
Router(config-if)# dot1x port-control auto
The following show dot1x command sample output shows that 802.1X authentication has been configured
on a router:

Router# show dot1x all


Sysauthcontrol Enabled
Dot1x Protocol Version 2
Dot1x Info for FastEthernet1
-----------------------------------
PAE = AUTHENTICATOR
PortControl = AUTO
ControlDirection = Both
HostMode = MULTI_HOST
ReAuthentication = Enabled
QuietPeriod = 600
ServerTimeout = 60
SuppTimeout = 30
ReAuthPeriod = 1800 (Locally configured)
ReAuthMax = 2
MaxReq = 3

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


23
VPN Access Control Using 802.1X Authentication
Configuring Router and RADIUS Communication

TxPeriod = 60
RateLimitPeriod = 60

Configuring Router and RADIUS Communication


To configure RADIUS server parameters, perform the following steps.

SUMMARY STEPS

1. enable
2. configure terminal
3. ip radius source-interface interface-name
4. radius-server host {hostname | ip-address}
5. radius-server key string

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router> enable

Step 2 configure terminal Enters global configuration mode.

Example:

Router# configure terminal

Step 3 ip radius source-interface interface-name Forces RADIUS to use the IP address of a specified interface for all
outgoing RADIUS packets.

Example:

Router (config)# ip radius source-


interface fastethernet1

Step 4 radius-server host {hostname | ip-address} Configures the RADIUS server host name or IP address of the router.
• To use multiple RADIUS servers, reenter this command for
each server.
Example:

Router (config)# radius-server host


192.0.2.0

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


24
VPN Access Control Using 802.1X Authentication
Configuring 802.1X Parameters Retransmissions and Timeouts

Command or Action Purpose


Step 5 radius-server key string Configures the authorization and encryption key used between the
router and the RADIUS daemon running on the RADIUS server.
• The key is a text string that must match the encryption key used
Example:
on the RADIUS server.
Router (config)# radius-server key
radiuskey

Example
The following example shows that RADIUS server parameters have been configured on the router:

Router# configure terminal


Router(config)# ip radius source-interface ethernet1
Router(config)# radius-server host 192.0.2.1
Router(config)# radius-server key radiuskey

Configuring 802.1X Parameters Retransmissions and Timeouts


Various 802.1X retransmission and timeout parameters can be configured. Because all of these parameters
have default values, configuring them is optional. To configure the retransmission and timeout parameters,
perform the following steps.

SUMMARY STEPS

1. enable
2. configure terminal
3. interface type slot / port
4. dot1x max-req number-of-retries
5. dot1x port-control [auto| force-authorized| force-unauthorized]
6. dot1x control-direction {both | in}
7. dot1x reauthentication
8. dot1x timeout tx-period seconds
9. dot1x timeout server-timeout seconds
10. dot1x timeout reauth-period seconds
11. dot1x timeout quiet-period seconds
12. dot1x timeout ratelimit-period seconds

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router> enable

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


25
VPN Access Control Using 802.1X Authentication
Configuring 802.1X Parameters Retransmissions and Timeouts

Command or Action Purpose


Step 2 configure terminal Enters global configuration mode.

Example:

Router# configure terminal

Step 3 interface type slot / port Enters interface configuration mode and specifies the interface to be
enabled for 802.1X port-based authentication.

Example:

Router (config)# interface


FastEthernet 0/1

Step 4 dot1x max-req number-of-retries Sets the maximum number of times that the router sends an EAP request/
identity frame (assuming that no response is received) to the supplicant
before concluding that the supplicant does not support 802.1X.
Example:

Router (config-if)# dot1x max-req 3

Step 5 dot1x port-control [auto| force-authorized| Sets the port control value.
force-unauthorized]
• auto (optional) --Authentication status of the supplicant will be
determined by the authentication process.
Example: • force-authorized (optional) --All the supplicants on the interface
will be authorized. The force-authorized keyword is the default.
Router (config-if)# dot1x port- • force-unauthorized (optional) --All the supplicants on the interface
control auto
will be unauthorized.

Step 6 dot1x control-direction {both | in} Changes the port control to unidirectional or bidirectional.

Example:

Router (config-if)# dot1x control-


direction both

Step 7 dot1x reauthentication Enables periodic reauthentication of the supplicants on the interface.
• The reauthentication period can be set using the dot1x timeout
command.
Example:

Router (config-if)# dot1x


reauthentication

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


26
VPN Access Control Using 802.1X Authentication
Configuring 802.1X Parameters Retransmissions and Timeouts

Command or Action Purpose


Step 8 dot1x timeout tx-period seconds Sets the timeout for supplicant retries.
• If an 802.1X packet is sent to the supplicant and the supplicant does
not send a response, the packet will be sent again after the time that
Example:
was set using the seconds argument.
Router (config-if)# dot1x timeout tx- • The value is 1 through 65535 seconds. The default is 30 seconds.
period 60

Step 9 dot1x timeout server-timeout seconds Sets the timeout for RADIUS retries.
• If an 802.1X packet is sent to the server, and the server does not send
a response, the packet will be sent again after the time that was set
Example:
using the seconds argument.
Router (config-if)# dot1x timeout • The value is from 1 to 65535 seconds. The default is 30 seconds.
server-timeout 60

Step 10 dot1x timeout reauth-period seconds Sets the time after which an automatic reauthentication should be
initiated.
• The value is from 1 to 65535 seconds. The default is 3600 seconds.
Example:

Router (config-if)# dot1x timeout


reauth-period 1800

Step 11 dot1x timeout quiet-period seconds The time after which authentication is restarted after the authentication
has failed.
• The value is from 1 to 65535 seconds. The default is 120 seconds.
Example:

Router (config-if)# dot1x timeout


quiet-period 600

Step 12 dot1x timeout ratelimit-period seconds The rate limit period throttles the EAP-START packets from
misbehaving supplicants.
• The value is from 1 to 65535 seconds.
Example:

Router (config-if)# dot1x timeout


ratelimit-period 60

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


27
VPN Access Control Using 802.1X Authentication
Configuring the Identity Profile

Examples
The following configuration example shows that various retransmission and timeout parameters have been
configured:

Router# configure terminal

Router(config)# interface FastEthernet1

Router(config-if)# dot1x port-control auto

Router(config-if)# dot1x reauthentication

Router(config-if)# dot1x timeout reauth-period 1800

Router(config-if)# dot1x timeout quiet-period 600

Router(config-if)# dot1x timeout supp-timeout 60

Router(config-if)# dot1x timeout server-timeout 60

Configuring the Identity Profile


The identity profile default command allows you to configure the static MAC addresses of the client that
do not support 802.1X and to authorize or unauthorize them statically. The VPN Access Control Using
802.1X Authentication feature allows authenticated and unauthenticated users to be mapped to different
interfaces. Under the dot1x profile configuration mode, you can specify the virtual template interface that
should be used to create the virtual-access interface to which unauthenticated supplicants will be mapped.
To specify which virtual template interface should be used to create the virtual access interface, perform the
following steps.

SUMMARY STEPS

1. enable
2. configure terminal
3. identity profile default
4. description line-of-description
5. template virtual-template
6. device [authorize | not-authorize] mac-address mac-address
7. device authorize type device-type

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router> enable

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


28
VPN Access Control Using 802.1X Authentication
Configuring the Identity Profile

Command or Action Purpose


Step 2 configure terminal Enters global configuration mode.

Example:

Router# configure terminal

Step 3 identity profile default Creates an identity profile and enters identity profile
configuration mode.

Example:

Router (config)# identity profile default

Step 4 description line-of-description Associates descriptive text with the profile.

Example:

Router (config-identity-prof)# description


description 1

Step 5 template virtual-template Specifies the virtual template interface that will serve as
the configuration clone source for the virtual interface
that is dynamically created for authenticated users.
Example:

Router (config-identity-prof)# template virtual-


template 1

Step 6 device [authorize | not-authorize] mac-address mac-address Statically authorizes or unauthorizes a supplicant (by
giving its MAC address) if the supplicant does not
“understand” 802.1X.
Example:

Router (config-identity-prof)# device authorize mac-


address 1.1.1

Step 7 device authorize type device-type Statically authorizes or unauthorizes a device type.

Example:

Router (config-identity-prof)# device authorize


type cisco ip phone

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


29
VPN Access Control Using 802.1X Authentication
Configuring the Identity Profile

Examples
The following example shows that Cisco IP phones and a specific MAC address have been statically
authorized:

Router# configure terminal

Router (config)# identity profile default

Router(config-1x-prof)# description put the description here

Router(config-1x-prof)# template virtual-template1

Router(config-1x-prof)# device authorize type cisco ip phone

Router(config-1x-prof)# device authorize mac-address 0001.024B.B4E7

Configuring the Identity Profile

SUMMARY STEPS

1. enable
2. configure terminal
3. identity profile default
4. description description-string
5. template virtual-template
6. exit

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router> enable

Step 2 configure terminal Enters global configuration mode.

Example:

Router# configure terminal

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


30
VPN Access Control Using 802.1X Authentication
Configuring the DHCP Private Pool

Command or Action Purpose


Step 3 identity profile default Creates an identity profile and enters identity
profile configuration mode.

Example:

Router (config)# identity profile default

Step 4 description description-string Associates descriptive text with the identity


profile.

Example:

Router (config-identity-prof)# description


description_string_goes_here

Step 5 template virtual-template Specifies the virtual template interface that will
serve as the configuration clone source for the
virtual interface that is dynamically created for
Example: authenticated users.

Router (config-identity-prof)# template virtualtemplate1

Step 6 exit Exits identity profile configuration mode.

Example:

Router (config-template)# exit

Configuring the DHCP Private Pool


The VPN Access Control Using 802.1X Authentication feature can be configured with one DHCP pool or
two. If there are two pools, the unauthenticated and authenticated devices will get their addresses from
separate DHCP pools. For example, the public pool can have an address block that has only local
significance, and the private pool can have an address that is routable over the VPN tunnel.

SUMMARY STEPS

1. ip dhcp pool name


2. network network-number [mask]
3. default-router address

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


31
VPN Access Control Using 802.1X Authentication
Configuring the DHCP Public Pool

DETAILED STEPS

Command or Action Purpose


Step 1 ip dhcp pool name Configures a DHCP private address pool on a Cisco IOS
DHCP server and enters DHCP pool configuration mode.

Example:

Router (config)# ip dhcp pool private

Step 2 network network-number [mask] Configures the subnet number and mask for a DHCP
private address pool on a Cisco IOS DHCP server.

Example:

Router (dhcp-config)# network 209.165.200.225


255.255.255.224

Step 3 default-router address Specifies the default router list for a DHCP client.

Example:

Router (dhcp-config)# default-router 192.0.2.2

Configuring the DHCP Public Pool


The VPN Access Control Using 802.1X Authentication feature can be configured with one DHCP pool or
two. If there are two pools, the unauthenticated and authenticated devices will get their addresses from
separate DHCP pools. For example, the public pool can have an address block that has only local
significance, and the private pool can have an address that is routable over the VPN tunnel.

SUMMARY STEPS

1. ip dhcp pool name


2. network network-number [mask]
3. default-router address
4. exit

DETAILED STEPS

Command or Action Purpose


Step 1 ip dhcp pool name Configures the DHCP public address pool on a Cisco
IOS DHCP server.

Example:

Router (config-dhcp)# ip dhcp pool public

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


32
VPN Access Control Using 802.1X Authentication
Configuring the Interface

Command or Action Purpose


Step 2 network network-number [mask] Configures the subnet number and mask for a DHCP
public address pool on a Cisco IOS DHCP server.

Example:

Router (config-dhcp)# network 209.165.200.226


255.255.255.224

Step 3 default-router address Specifies the default router list for a DHCP client.

Example:

Router (config-dhcp)# default-router 192.0.2.3

Step 4 exit Exits DHCP pool configuration mode.

Example:

Router (config-dhcp)# exit

Configuring the Interface

SUMMARY STEPS

1. configure terminal
2. interface type slot / port
3. ip address ip-address mask [secondary]
4. interface virtual-template number
5. ip address ip-address mask [secondary]
6. exit

DETAILED STEPS

Command or Action Purpose


Step 1 configure terminal Enters global configuration mode.

Example:

Router# configure terminal

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


33
VPN Access Control Using 802.1X Authentication
Configuring an Interface Without Assigning an Explicit IP Address to the Interface

Command or Action Purpose


Step 2 interface type slot / port Enters interface configuration mode and specifies
the interface to be enabled.

Example:

Router (config)# interface loopback 0/1

Step 3 ip address ip-address mask [secondary] Sets the private IP address for the interface.

Example:

Router (config-if)# ip address 209.165.200.227


255.255.255.224

Step 4 interface virtual-template number Creates a virtual template interface that can be
configured and applied dynamically in creating
virtual access interfaces.
Example:

Router (config-if)# interface virtual-template 1

Step 5 ip address ip-address mask [secondary] Sets the public IP address for the interface.

Example:

Router (config-if)# ip address 209.165.200.227


255.255.255.224

Step 6 exit Exits interface configuration mode.

Example:

Router (config-if)# exit

Configuring an Interface Without Assigning an Explicit IP Address to the Interface

SUMMARY STEPS

1. enable
2. configure terminal
3. interface type slot / port
4. ip unnumbered type number

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


34
VPN Access Control Using 802.1X Authentication
Configuring an Interface Without Assigning an Explicit IP Address to the Interface

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router# enable

Step 2 configure terminal Enters global configuration mode.

Example:

Router# configure terminal

Step 3 interface type slot / port Enters interface configuration mode and specifies the interface to
be enabled.

Example:

Router (config)# interface virtual-template 1

Step 4 ip unnumbered type number Enables IP processing on an interface without assigning an explicit
IP address to the interface.

Example:

Router (config-if)# ip unnumbered loopback 0

Example
The following example shows that the identity profile associates virtual-template1 with unauthenticated
supplicants. Virtual-template1 gets its IP address from interface loopback 0, and unauthenticated
supplicants are associated with a public pool. Authenticated users are associated with a private pool.

Router(config)# identity profile default


Router(config-identity-prof)# description put the description here
Router(config-identity-prof)# template virtual-template1
Router(config-identity-prof)# exit
Router(config)# ip dhcp pool private
Router(dhcp-config)# default-router 192.0.2.0
Router(dhcp-config)# exit
Router(config)#ip dhcp pool public
Router(dhcp-config)# default-router 192.0.2.1
Router(dhcp-config)# exit
Router(config)# interface
Router(dhcp-config)# network 209.165.200.225 255.255.255.224
Router(dhcp-config)# default-router 192.0.2.1
Router(dhcp-config)# exit
Router(config)# interface loopback0
Router(config-if)# interface ethernet0
Router(config-if)# ip address 209.165.200.226 255.255.255.224
Router(config-if)# exit
Router(config)# interface virtual-template1
Router(config-if)# ip unnumbered loopback 0

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


35
Configuring a PC As an 802.1X Supplicant
Configuring the Necessary Access Control Policies

Configuring the Necessary Access Control Policies


802.1X authentication separates traffic from authenticated and unauthenticated devices. Traffic from
authenticated devices transit through the physical interface, and unauthenticated traffic transits through the
Virtual-Template1. Therefore, different policies can be applied on each interface. The configuration will
also depend on whether two DHCP pools or a single DHCP pool is being used. If a single DHCP pool is
being used, access control can be configured on Virtual-Template1, which will block any traffic from going
to the networks to which unauthenticated devices should not have access. These networks (to which
unauthenticated devices should not have access) could be the corporate subnetworks protected by the VPN
or encapsulated by generic routing encapsulation (GRE). There can also be access control that restricts the
access between authenticated and unauthenticated devices.
If two pools are configured, the traffic from a non-trusted pool is routed to the Internet using Network
Address Translation (NAT), whereas trusted pool traffic is forwarded through a VPN tunnel. The routing
can be achieved by configuring ACLs used by NAT and VPN accordingly.
For an example of an access control policy configuration, see the Access Control Policies Example section.

Configuring a PC As an 802.1X Supplicant


• Configuring a PC for VPN Access Control Using 802.1X Authentication, page 36
• Enabling 802.1X Authentication on a Windows 2000 XP PC, page 36
• Enabling 802.1X Authentication on a Windows 2000 PC, page 37
• Enabling 802.1X Authentication on a Windows XP PC, page 37
• Enabling 802.1X Authentication on Windows 2000 and Windows XP PCs, page 38

Configuring a PC for VPN Access Control Using 802.1X Authentication


To configure your PC for VPN Access Control Using 802.1X Authentication, perform the following steps.

SUMMARY STEPS

1. Enable 802.1X for MD5.


2. Enable DHCP.

DETAILED STEPS

Step 1 Enable 802.1X for MD5.


Step 2 Enable DHCP.

Enabling 802.1X Authentication on a Windows 2000 XP PC


802.1X implementation on a Windows 2000/XP PC is unstable. A more stable 802.1X client, AEGIS (beta)
for Microsoft Windows, is available at the Meetinghouse Data Communications website at
www.mtghouse.com.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


36
VPN Access Control Using 802.1X Authentication
Enabling 802.1X Authentication on a Windows 2000 PC

Enabling 802.1X Authentication on a Windows 2000 PC


To enable 802.1X authentication on your Windows 2000 PC, perform the following steps.

SUMMARY STEPS
1. Make sure that the PC has at least Service Pack 3.
2. Reboot your PC after installing the client.
3. Go to the Microsoft Windows registry and add or install the following entry:
4. Reboot your PC.

DETAILED STEPS

Step 1 Make sure that the PC has at least Service Pack 3.


Go to the page “Microsoft 802.1x Authentication Client” on the Microsoft Windows 2000 website at the following
URL:
http://www.microsoft.com/windows2000/server/evaluation/news/bulletins/8021xclient.asp.
At the above site, download and install 802.1X client for Windows 2000.
If the above site is unavailable, search for the “Q313664: Recommended Update” page on the Microsoft Windows
2000 website at the following URL: http://www.microsoft.com/windows2000/downloads/recommended/q313664/
default.asp
Step 2 Reboot your PC after installing the client.
Step 3 Go to the Microsoft Windows registry and add or install the following entry:
“HKLM\Software\Microsoft\EAPOL\Parameters\General\Global\SupplicantMode REG_DWORD 3”
(“SupplicantMode” key entry is not there by default under Global option in the registry. So add a new entry named
“SupplicantMode” as REG_DOWORD and then set its value to 3.)
Step 4 Reboot your PC.

Enabling 802.1X Authentication on a Windows XP PC


To enable 802.1X authentication on a Windows XP PC, perform the following steps.

SUMMARY STEPS
1. Go to the Microsoft Windows registry and install the following entry there:
2. Reboot your PC.

DETAILED STEPS

Step 1 Go to the Microsoft Windows registry and install the following entry there:
“HKLM\Software\Microsoft\EAPOL\Parameters\General\Global\SupplicantMode REG_DWORD 3”
Step 2 Reboot your PC.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


37
VPN Access Control Using 802.1X Authentication
Enabling 802.1X Authentication on Windows 2000 and Windows XP PCs

Enabling 802.1X Authentication on Windows 2000 and Windows XP PCs


To enable 802.1X authentication on Windows 2000 and Windows XP PCs, that is, if you are operating both
at the same time, perform the following steps.

SUMMARY STEPS
1. Open the Network and Dial-up Connections window on your computer.
2. Right-click the Ethernet interface (Local Area Connection) to open the properties window. It should
have a tab called “Authentication.”

DETAILED STEPS

Step 1 Open the Network and Dial-up Connections window on your computer.
Step 2 Right-click the Ethernet interface (Local Area Connection) to open the properties window. It should have a tab called
“Authentication.”
Click the Authentication tab. Select the check box titled “Enable network access control using IEEE 802.1X.”
In a short period of time you should see a dialog box (for Windows 2000) or a floating window asking you to select it.
Select it, and when the next window appears, enter the username and password in this dialog box. See the figure
below.

Figure 3 Local Area Connection Properties Window

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


38
Configuring a Router As an 802.1X Supplicant
Enabling 802.1X Authentication on Windows 2000 and Windows XP PCs

Configuring a Router As an 802.1X Supplicant


To configure a router as an 802.1X supplicant, perform the following steps.

SUMMARY STEPS

1. enable
2. configure terminal
3. aaa authentication dot1x {default | listname} method1 [method2...]
4. dot1x credentials name
5. username name
6. password [0 | 7] password
7. exit
8. interface type number
9. dot1x pae supplicant
10. dot1x credentials name
11. end

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router> enable

Step 2 configure terminal Enters global configuration mode.

Example:

Router# configure terminal

Step 3 aaa authentication dot1x {default | listname} method1 Specifies one or more authentication, authorization,
[method2...] and accounting (AAA) methods for use on interfaces
running IEEE 802.1X.

Example:

Router(config)# aaa authentication dot1x default


group radius

Step 4 dot1x credentials name Specifies the 802.1X credential profile to use when
configuring a supplicant.

Example:

Router(config)# dot1x credentials name1

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


39
VPN Access Control Using 802.1X Authentication
Enabling 802.1X Authentication on Windows 2000 and Windows XP PCs

Command or Action Purpose


Step 5 username name Specifies the username for an 802.1X credentials
profile.

Example:

Router(config-dot1x-creden)# username username1

Step 6 password [0 | 7] password Specifies the password for an 802.1X credentials


profile.

Example:

Router(config-dot1x-creden)# password 0 password1

Step 7 exit Enters global configuration mode.

Example:

Router(config-dot1x-creden)# exit

Step 8 interface type number Enters interface configuration mode.

Example:

Router(config)# interface Fastethernet0/0

Step 9 dot1x pae supplicant Sets the Port Access Entity (PAE) type as supplicant.

Example:

Router(config-if)# dot1x pae supplicant

Step 10 dot1x credentials name Specifies the 802.1X credential profile to use when
configuring a supplicant.

Example:

Router(config-if)# dot1x credentials name1

Step 11 end (Optional) Exits the current configuration mode.

Example:

Router(config-if)# end

• Troubleshooting Tips, page 41

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


40
Monitoring VPN Access Control Using 802.1X Authentication
Troubleshooting Tips

Troubleshooting Tips
Use the debug commands in the Monitoring VPN Access Control Using 802.1X Authentication section to
debug the supplicant.

Monitoring VPN Access Control Using 802.1X Authentication


To monitor VPN Access Control Using 802.1X Authentication, perform the following steps. The
commands shown in the steps may be used one at a time and in no particular order.

SUMMARY STEPS

1. enable
2. clear dot1x {all | interface}
3. clear eap sessions [credentials credentials-name | interface interface-name | method method-name |
transporttransport-name]]
4. debug dot1x [ all | errors | events | feature | packets | redundancy | registry | state-machine ]
5. debug eap [all | method] [authenticator | peer] {all | errors | events | packets | sm}
6. dot1x initialize [interface interface-name]
7. dot1x re-authenticate interface-type interface-number

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router> enable

Step 2 clear dot1x {all | interface} Clears 802.1X interface information.

Example:

Router# clear dot1x all

Step 3 clear eap sessions [credentials credentials-name | interface Clears EAP information on a switch or for a specified
interface-name | method method-name | transporttransport- port.
name]]

Example:

Router# clear eap sessions credentials type1

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


41
Verifying VPN Access Control Using 802.1X Authentication
Troubleshooting Tips

Command or Action Purpose


Step 4 debug dot1x [ all | errors | events | feature | packets | Displays 802.1X debugging information.
redundancy | registry | state-machine ]
• all -Enables all 802.1X debugging messages.
• errors -Provides information about all 802.1X
Example: errors.
• events -Provides information about all 802.1X
Router# debug dot1x all events.
• feature -Provides information about 802.1X
features for switches only.
• packets -Provides information about all 802.1X
packets.
• redundancy -Provides information about 802.1X
redundancy.
• registry -Provides information about 802.1X
registries.
• state-machine --Provides information regarding
the 802.1X state machine.

Step 5 debug eap [all | method] [authenticator | peer] {all | errors | Displays information about EAP.
events | packets | sm}

Example:

Router# debug eap all

Step 6 dot1x initialize [interface interface-name] Initializes an interface.

Example:

Router# dot1x initialize interface FastEthernet1

Step 7 dot1x re-authenticate interface-type interface-number Reauthenticates all the authenticated devices that are
attached to the specified interface.

Example:

Router# dot1x re-authenticate FastEthernet1

Verifying VPN Access Control Using 802.1X Authentication


To verify VPN Access Control Using 802.1X Authentication, perform the following steps.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


42
VPN Access Control Using 802.1X Authentication
Configuration Examples for VPN Access Control Using 802.1X Authentication

SUMMARY STEPS

1. enable
2. show dot1x [interface interface-name[details]]
3. show eap registrations [method | transport]
4. show eap sessions [credentials credentials-name | interfaceinterface-name | method method-name |
transport transport-name]

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:

Router> enable

Step 2 show dot1x [interface interface-name[details]] Shows details for an identity profile.

Example:

Router# show dot1x interface FastEthernet 1 details

Step 3 show eap registrations [method | transport] Displays EAP registration information.

Example:

Router# show eap registrations method

Step 4 show eap sessions [credentials credentials-name | interfaceinterface-name | Displays active EAP session
method method-name | transport transport-name] information.

Example:

Router# show eap sessions interface gigabitethernet1/0/1

Configuration Examples for VPN Access Control Using 802.1X


Authentication
• Typical VPN Access Control Using 802.1X Configuration Example, page 44
• Access Control Policies Example, page 47

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


43
Typical VPN Access Control Using 802.1X Configuration Example
Configuration Examples for VPN Access Control Using 802.1X Authentication

Typical VPN Access Control Using 802.1X Configuration Example


The following sample output shows that VPN access control using 802.1X authentication has been
configured. Output is shown for the router and for the gateway.

Router

Router# show running-config


Building configuration...
Current configuration : 2457 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname 871-1
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
!
aaa new-model
!
!
aaa authentication dot1x default group radius group radius
!
!
aaa session-id common
!
!
dot11 syslog
ip source-route
!
ip dhcp pool private
network 209.165.200.225 255.255.255.224
default-router 192.0.2.18
!
ip dhcp pool public
network 209.165.200.226 255.255.255.224
default-router 192.0.2.17
!
ip dhcp pool name
default-router 192.0.2.16
!
!
ip cef
no ip domain lookup
ip host sjc-tftp02 192.0.2.15
ip host sjc-tftp01 192.0.2.14
ip host dirt 192.0.2.13
!
!
!
template virtualtemplate1
!
dot1x system-auth-control
dot1x credentials basic-user
description This credentials profile should be used for most configured ports
username router1
password 0 secret
!
identity profile default
description description 1
device authorize mac-address 0001.024b.b4e7
device authorize mac-address 0001.0001.0001
device authorize type cisco ip phone

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


44
VPN Access Control Using 802.1X Authentication
Configuration Examples for VPN Access Control Using 802.1X Authentication

template Virtual-Template1
!
!
!
!
!
archive
log config
hidekeys
!
!
!
!
!
interface Loopback0
ip address 209.165.200.227 255.255.255.224
!
interface FastEthernet0
!
interface FastEthernet1
dot1x pae authenticator
dot1x port-control auto
dot1x timeout quiet-period 600
dot1x timeout server-timeout 60
dot1x timeout reauth-period 1800
dot1x timeout tx-period 60
dot1x timeout ratelimit-period 60
dot1x max-req 3
dot1x reauthentication
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
no ip address
shutdown
duplex auto
speed auto
!
interface Virtual-Template1
ip unnumbered Loopback0
!
interface Dot11Radio0
no ip address
shutdown
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0
station-role root
no cdp enable
!
interface Vlan1
ip address 209.165.200.228 255.255.255.224
!
ip default-gateway 192.0.2.10
ip default-network 192.0.2.11
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.0.2.11
ip route 209.165.200.229 255.255.255.224 192.0.2.12
no ip http server
no ip http secure-server
!
!
ip radius source-interface FastEthernet1
!
!
!
radius-server host 192.0.2.9 auth-port 1645 acct-port 1646
radius-server key radiuskey
!
control-plane
!
!
line con 0

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


45
VPN Access Control Using 802.1X Authentication
Configuration Examples for VPN Access Control Using 802.1X Authentication

exec-timeout 30 0
logging synchronous
no modem enable
line aux 0
line vty 0 4
privilege level 15
password lab
!
scheduler max-task-time 5000
end

Peer Router As Gateway

Router# show running-config


Building configuration...
Current configuration: 1828 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname c3725
!
!
no aaa new-model
ip subnet-zero
!
vpdn enable
!
vpdn-group 1
accept-dialin
protocol pppoe
virtual-template 1
!
mpls ldp logging neighbor-changes
!
crypto isakmp policy 1
authentication pre-share
crypto isakmp key 0 test address 192.0.2.8
!
!
crypto ipsec transform-set t1 ah-md5-hmac esp-des
crypto mib ipsec flowmib history tunnel size 2
crypto mib ipsec flowmib history failure size 2
!
crypto map test 1 ipsec-isakmp
set peer 192.0.2.7
set transform-set t1
match address 101
!
no voice hpi capture buffer
no voice hpi capture destination
!
interface Loopback0
description corporate
ip address 209.165.200.230 255.255.255.224
!
interface Loopback1
description internet
ip address 209.165.200.231 255.255.255.224
!
interface FastEthernet0/0
ip address 209.165.200.232 255.255.255.224
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
speed auto
half-duplex
pppoe enable

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


46
Access Control Policies Example
Configuration Examples for VPN Access Control Using 802.1X Authentication

!
interface ATM1/0
ip address 209.165.200.233 255.255.255.224
no atm ilmi-keepalive
pvc 1/43
protocol ip 192.0.2.6 broadcast
encapsulation aal5snap
!
!
interface FastEthernet2/0
no ip address
speed auto
full-duplex
!
interface FastEthernet2/1
no ip address
shutdown
duplex auto
speed auto
!
interface Virtual-Template1
ip address 209.165.200.234 255.255.255.224
ip mtu 1492
crypto map test
!
!
router rip
network 192.0.2.5
network 192.0.2.4
network 192.0.2.3
network 192.0.2.2
network 192.0.2.1
!
ip http server
no ip http secure-server
ip classless
!
access-list 101 permit ip 10.5.0.0 0.0.0.255 10.0.0.1 0.0.0.255
no cdp log mismatch duplex
!
line con 0
exec-timeout 0 0
line aux 0
line vty 0 4
login
!
!
end

Access Control Policies Example


The following output example shows that access control policies have been configured.

Single DHCP pool

ip dhcp pool private


network 209.165.200.236 255.255.255.224
default-router 20.0.0.1
exit
crypto isakmp policy 1
authentication pre-share
!
crypto isakmp key test address address
crypto ipsec transform-set t1 esp-3des esp-sha-hmac
mode tunnel
crypto map test 1 ipsec-isakmp
set peer address
set transform-set t1
match address 101
access-list 101 permit ip 10.0.0.0 0.0.0.255 50.0.0.0 0.0.0.255

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


47
VPN Access Control Using 802.1X Authentication
Additional References

access-list 102 deny ip 10.0.0.0 0.0.0.255 50.0.0.0 0.0.0.255


access-list 102 permit ip any any
!
interface Ethernet0
! inside interface
! dot1x configs
!
interface Virtual-Template1
! Deny traffic from going to VPN
ip access-group 102 in
!
Interface Ethernet1
! outside interface
crypto map test

Two DHCP Pools

ip dhcp pool private


network 209.165.200.237 255.255.255.224
default-router 192.0.2.1
exit
!
ip dhcp pool public
network 209.165.200.238 255.255.255.224
default-router 192.0.2.0
exit
!
crypto isakmp policy 1
authentication pre-share
!
crypto isakmp key test address address
crypto ipsec transform-set t1 esp-3des esp-sha-hmac
mode tunnel
crypto map test 1 ipsec-isakmp
set peer address
set transform-set t1
match address 101
access-list 101 permit ip 10.0.0.0 0.0.0.255 10.10.0.0 0.0.0.255
access-list 102 permit ip 10.0.0.1 0.0.0.255 any
!
interface Ethernet0
!inside interface
! dot1x configs
!
interface Loopback0
ip address 209.165.200.239 255.255.255.224
!
interface Virtual-Template1
ip unnumbered Loopback0
ip nat inside
!
Interface Ethernet1
! outside interface
crypto map test
ip nat outside
!
ip nat inside source list 102 interface Ethernet1 overload

Additional References

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


48
VPN Access Control Using 802.1X Authentication
Additional References

Related Documents

Related Topic Document Title


Configuring 802.1X port-based authentication Configuring IEEE 802.1X Port-Based
Authentication module.

DHCP Cisco IOS IP Addressing Services Configuration


Guide

IPSec Cisco IOS Security Configuration Guide: Secure


Connectivity, Release 15.0.

RADIUS Configuring RADIUS module.

Security commands Cisco IOS Security Command Reference

User lists on a Cisco ACS User Guide for Cisco Secure ACS for Windows
Server Version 3.2.

Standards

Standard Title
IEEE 802.1X protocol --

MIBs

MIB MIBs Link


None. To locate and download MIBs for selected
platforms, Cisco IOS releases, and feature sets, use
Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs

RFCs

RFC Title
RFC-2284 RFC 2284 (PPP Extensible Authentication Protocol
[EAP]) document from The Internet Requests for
Comments (RFC) document series

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


49
VPN Access Control Using 802.1X Authentication
Feature Information for VPN Access Control Using 802.1X Authentication

Technical Assistance

Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.

Feature Information for VPN Access Control Using 802.1X


Authentication
The following table provides release information about the feature or features described in this module.
This table lists only the software release that introduced support for a given feature in a given software
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

Table 3 Feature Information for VPN Access Control Using 802.1X Authentication

Feature Name Releases Feature Information


VPN Access Control Using 12.3(2)XA The VPN Access Control Using
802.1X Authentication 802.1X Authentication feature
was introduced. This feature
allows enterprise employees to
access their enterprise networks
from home while allowing other
household members to access
only the Internet.

VPN Access Control Using 12.3(4)T This feature was integrated into
802.1X Authentication Cisco IOS Release 12.3(4)T, and
the following platform support
was added: Cisco 1751, Cisco
2610XM - Cisco 2611XM, Cisco
2620XM - Cisco 2621XM, Cisco
2650XM - Cisco 2651XM, Cisco
2691, Cisco 3640, Cisco 3640A,
and Cisco 3660.

802.1X Supplicant Support 12.3(11)T 802.1X supplicant support was


added.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


50
VPN Access Control Using 802.1X Authentication

Feature Name Releases Feature Information


Converged 802.1X Authenticator 12.4(6)T Converged 802.1X authenticator
and Converged 802.1X and converged 802.1X supplicant
Supplicant Support support was added. (This update
is a standardization of Cisco IOS
802.1X commands for various
Cisco IOS platforms. This is no
change in 802.1X features.)
Affected commands include the
following: clear eap , debug
dot1x , debug eap , description
(dot1x credentials) , dot1x
control-direction , dot1x
credentials , dot1x default ,
dot1x host-mode , dot1x max-
reauth-req , dot1x max-start ,
dot1x multiple-hosts , dot1x
timeout , eap , identity profile ,
password (dot1x credentials) ,
show eap registrations , show
eap sessions, and username

VPN Access Control Using 12.4(4)XC Various 802.1X commands were


802.1X Authentication integrated into Cisco IOS Release
12.4(4)XC for Cisco 870
Integrated Services Routers
(ISRs) only.
Affected commands include the
following: dot1x control-
direction , dot1x default , dot1x
guest-vlan , dot1x host-mode ,
dot1x max-reauth-req , dot1x
max-req , dot1x max-start ,
dot1x pae , dot1x port-control ,
dot1x re-authenticate
(privileged EXEC) , dot1x
reauthentication , dot1x system-
auth-control , dot1x timeout,
macro global , macro name, and
show ip igmp snooping

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


51
VPN Access Control Using 802.1X Authentication

and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.

802.1X Authentication Services Configuration Guide Cisco IOS Release 12.4


52

You might also like