802.1X Port-Based Authentication on Cisco Devices
In this blog post I’m going to describe the configuration commands needed to configure dot1x authentication, as well as the home lab I built to test the basic functionalities of 802.1X port-based authentication with Cisco switches and Cisco ISE. 802.1x Authentication Configuration on Cisco Switches Here is the Cisco switch 802.1x configuration that worked for me in my home lab. Line 131: activates AAA lines 134 – 135: defining the Radius server group Lines 164 – 166: defining the Radius server and the secret key. Line 137: enables AAA dot1x authentication using the default method list, and using the Radius server group defined above. Lines 142 – 150: this is the interface connected to the 802.1x supplicant. I put a generic access-list (default_acl) as a default ACL, in case the dACL feature does not work. 802.1x Port-based authentication Home lab topology Home lab constructs EVE-NG IOS images one router, the image version does not matter one switch with IOS ...