Reference Guide

802.1X | 107
7
802.1X
802.1X is supported on platforms: c e s
This chapter has the following sections:
Protocol Overview
Configuring 802.1X
Important Points to Remember
Enabling 802.1X
Configuring Request Identity Re-transmissions
Forcibly Authorize or Unauthorize a Port
Re-Authenticating a Port
Configuring Timeouts
Dynamic VLAN Assignment with Port Authentication
Guest and Authentication-Fail VLANs
Multi-Host Authentication
Multi-Supplicant Authentication
MAC Authentication Bypass
Dynamic CoS with 802.1X
Protocol Overview
802.1X is a method of port security. A device connected to a port that is enabled with 802.1X is disallowed
from sending or receiving traffic on the network until its identity can be verified (through a username and
password, for example); all ingress frames, except those used for 802.1X authentication, are dropped. This
feature is named for its IEEE specification.