Configuring 802.1X
Follow the below steps for 802.1X configuration process:
1. Prerequisites:
- Configure the 802.1X RADIUS authentication server IP and shared key on the PICA8 switch.
- Configure the username and password on the 802.1X RADIUS authentication server.
- (Optional) Configure parameters of other features.
2. Enable 802.1X authentication or MAB authentication on the switch.
3. (Optional) Configure parameters of other features on the switch:
- CoA
- Re-authentication
- Guest VLAN
- Dynamic VLAN
Procedure
Step1 Configure VLAN.
a) Configure VLAN ID.
set vlans vlan-id <vlan-id>
b) Configure the interface to VLAN.
set interface gigabit-ethernet <port> family ethernet-switching native-vlan-id <vlan-id>
Step2 Configure IP address for RADIUS authentication server and the shared key.
set protocols dot1x aaa radius authentication server-ip <ip-address> [shared-key <key-string>]
Step3 Configure the authentication mode, with dot1x by default.
set protocols dot1x interface <interface-name> auth-mode <dot1x | mac-radius | dot1x-mac-radius>
Step4 Configure port control, with auto by default.
set protocols dot1x interface <interface-name> port-control <auto | force-authorized | force-unauthorized>
Step5 Enable re-authentication function and re-authentication period.
set protocols dot1x interface <interface-name> reauthentication disable <true | false>
set protocols dot1x interface <interface-name> reauth-period < reauth-period >
Step6 Configure a RADIUS dynamic authorization client from which the switch accepts Change of Authorization (CoA) messages.
a) Configure the IP address of RADIUS dynamic authorization client.
set protocols dot1x aaa radius dynamic-author client <client-ip>
b) Configure the shared key of the RADIUS dynamic authorization client.
set protocols dot1x aaa radius dynamic-author client <client-ip> shared-key <key-string>
Step7 Configures a guest VLAN on an interface.
set protocols dot1x interface <interface-name> guest-vlan <vlan-id>
Step8 Enable the dynamic VLAN function.
set protocols dot1x interface <interface-name> dynamic-vlan-enable <true | false>
Configuration Example
Networking Requirements
As shown in Figure 1, a large number of user terminals in a company access the Internet through ge-1/1/1 of the PICA8 Switch (as the access device). To ensure network access security, the administrator employs 802.1X authentication on the Switch and RADIUS server, to control the network access rights of the user terminals. The Switch allows the user terminals to access resources on the Internet only when the authentication is passed successfully.
Configuration on the RADIUS Server
- Configure the username and password on the RADIUS authentication server.
- Configure the shared key.
- Configure other RADIUS attributes for 802.1X authentication.
Configuration on the Switch
- Configure the 802.1X authentication server IP and shared key on the Switch.
- Enable both 802.1X and MAB authentication on the Switch, to perform MAB authentication on terminals (such as printers) that cannot install the 802.1X client software.
Figure 1. Networking Diagram for Configuring 802.1X Authentication
Procedure
Step1 Configure a VLAN.
admin@XorPlus# set vlans vlan-id 100 admin@XorPlus# set interface gigabit-ethernet ge-1/1/1 family ethernet-switching native-vlan-id 100
Step2 Configure IP address of RADIUS server and the shared key.
admin@XorPlus# set protocols dot1x aaa radius authentication server-ip 10.10.51.4 shared-key pica8
Step3 Configure the authentication mode to dot1x-mac-radius to enable both 802.1X and MAB authentication.
admin@XorPlus# set protocols dot1x interface ge-1/1/1 auth-mode dot1x-mac-radius
Step4 Commit the configuration.
admin@XorPlus# commit
Step5 Verify the configuration.
a) Run the run show dot1x interface and run show dot1x mab command to check the 802.1X and MAB authentication configurations. The command output (PortEnabled = true) shows that the 802.1X authentication has been enabled on the interface ge-1/1/1 and MAC address ae:11:01:39:1a:00 is successfully authenticated.
admin@XorPlus# run show dot1x interface gigabit-ethernet ge-1/1/1 Dot1x Info for ge-1/1/1 ------------------------------ PortEnabled = true PortControl = AUTO QuietPeriod = 60 ServerTimeout = 30 ReAuthentication = true ReAuthPeriod = 3600 Dot1x Authenticator Client -------------------------- Supplicant = 08:9e:01:39:1a:fe Port Status = AUTHORIZED Auth SM State = AUTHENTICATED Auth BEND SM State = IDLE admin@Xorplus# run show dot1x mab interface gigabit-ethernet ge-1/1/1 Interface Mac AUTHENTICATED -------------- ----------------- ------ ge-1/1/1 ae:11:01:39:1a:00 true
b) The user starts the 802.1X client software on the terminal, enters the username and password, and starts authentication.
c) If the user name and password are correct, there will be an authentication success message displayed. Then users can access the network through this port.
Copyright © 2025 Pica8 Inc. All Rights Reserved.