Using Voice Aware 802.1X Security; Supplicant And Authenticator Switches With Network Edge Access Topology (Neat) - Cisco Catalyst 2975 Software Configuration Manual

Ios release 12.2(55)se
Hide thumbs Also See for Catalyst 2975:
Table of Contents

Advertisement

Understanding IEEE 802.1x Port-Based Authentication
For more information see the

Using Voice Aware 802.1x Security

You use the voice aware 802.1x security feature to configure the switch to disable only the VLAN on
which a security violation occurs, whether it is a data or voice VLAN. When an attempt to authenticate
the data client caused a security violation in previous releases, the entire port shut down, resulting in a
complete loss of connectivity.
You can use this feature where a PC is connected to the IP phone. A security violation found on the data
VLAN shuts down only the data VLAN. The traffic on the voice VLAN continues without interruption.
For information on configuring voice aware 802.1x security, see the
Security" section on page
802.1x Supplicant and Authenticator Switches with Network Edge Access
Topology (NEAT)
The Network Edge Access Topology (NEAT) feature extends identity to areas outside the wiring closet
(such as conference rooms). This allows any type of device to authenticate on the port.
You can enable MDA or multiauth mode on the authenticator switch interface that connects to one more
supplicant switches. Multihost mode is not supported on the authenticator switch interface.
Use the dot1x supplicant force-multicast global configuration command on the supplicant switch for
Network Edge Access Topology (NEAT) to work in all host modes.
Catalyst 2975 Switch Software Configuration Guide
10-30
Multiple-hosts mode with open authentication–Any host can access the network.
Multiple-authentication mode with open authentication–Similar to MDA, except multiple hosts can
be authenticated.
"Configuring the Host Mode" section on page 10-43.
10-38.
802.1x switch supplicant: You can configure a switch to act as a supplicant to another switch by
using the 802.1x supplicant feature. This configuration is helpful in a scenario, where, for example,
a switch is outside a wiring closet and is connected to an upstream switch through a trunk port. A
switch configured with the 802.1x switch supplicant feature authenticates with the upstream switch
for secure connectivity.
Once the supplicant switch authenticates successfully the port mode changes from access to trunk.
If the access VLAN is configured on the authenticator switch, it becomes the native VLAN for the
trunk port after successful authentication.
Host Authorization: Ensures that only traffic from authorized hosts (connecting to the switch with
supplicant) is allowed on the network. The switches use Client Information Signalling Protocol
(CISP) to send the MAC addresses connecting to the supplicant switch to the authenticator switch,
as shown in
Figure
10-6.
Auto enablement: Automatically enables trunk configuration on the authenticator switch, allowing
user traffic from multiple VLANs coming from supplicant switches. Configure the cisco-av-pair as
device-traffic-class=switch at the ACS. (You can configure this under the group or the user settings.)
Chapter 10
Configuring IEEE 802.1x Port-Based Authentication
"Configuring Voice Aware 802.1x
OL-19720-02

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents