Reference Guide

Network Security 253
The following is an example of some of the CLI commands:
Dot1x Authentication
This section describes Dot1x authentication.
It contains the following topics:
Port-Based Authentication Overview
•Dot1x Overview
Port-Based Authentication Global
Port-Based Authentication Interface Settings
Monitoring Users
Host Authentication
Port Authentication Users
Port-Based Authentication Overview
Port-based authentication enables authenticating system users on a per-port
basis via an external server. Only authenticated and approved system users
can transmit and receive data. Ports are authenticated via the RADIUS server
using the Extensible Authentication Protocol (EAP). Port Authentication
includes:
Authenticators
— Specifies the device port that is authenticated before
permitting system access.
Supplicants
— Specifies the host connected to the authenticated port hat
is requesting to access the system services.
Authentication Server
— Specifies the external server, for example, a
RADIUS server, which performs authentication on behalf of the
authenticator, and indicates whether the supplicant is authorized to access
system services.
console (config)# time-range http-allowed
console (config-time-range)# absolute start 12:00 1 jan
2005 end 12:00 31 dec 2005
console (config-time-range)# periodic monday 8:00 to
friday 20:00