After creating an 802.1X access profile, you need to configure it. You can select a proper authentication mode based on the authentication modes supported by the client and server and the processing capability of the device and server.
The system view is displayed.
The 802.1X access profile view is displayed.
An authentication mode is configured for 802.1X users.
By default, the authentication mode of 802.1X users is eap, which indicates Extensible Authentication Protocol (EAP) relay authentication.
The EAP relay can be configured for 802.1X users only when RADIUS authentication is used.
If AAA local authentication is used, the authentication mode for 802.1X users can only be set to EAP termination.
Because mobile phones do not support EAP termination mode (PAP and CHAP), the 802.1X authentication + local authentication mode cannot be configured for mobile phones. Terminals such as laptop computers support EAP termination mode only after having third-party clients installed.
If the 802.1X client uses the MD5 encryption mode, the user authentication mode on the device can be set to EAP or CHAP; if the 802.1X client uses the PEAP authentication mode, the authentication mode on the device can be set to EAP.
The types of packets that can trigger 802.1X authentication are configured.
By default, DHCP, DHCPv6, ND, and ARP packets can trigger 802.1X authentication.
802.1X authentication triggered by a unicast packet is enabled.
By default, 802.1X authentication triggered by a unicast packet is disabled
The authorization state of interfaces is configured.
By default, the authorization state of an interface is auto.
When a user goes offline due to causes such as network interruption, the device still reserves the user's online information. This may result in incorrect accounting, and brings security threats if a bogus user accesses the network.
To ensure that user online information is normal, you can configure handshake with online 802.1X authentication users on the device. The device then periodically sends handshake request packets to online 802.1X users. If a user does not respond to the handshake request packets when the retransmission count is reached, the device sets the user status to offline.
If the 802.1X client cannot exchange handshake packets with the device, the device will not receive the handshake response packets within the handshake period. Therefore, to prevent the device from disconnecting users mistakenly, disable the online user handshake function.
This function takes effect only for the wired users.
Run dot1x handshake
The device is configured to handshake with online 802.1X users is enabled.
By default, handshake with online 802.1X users is disabled.
Run dot1x handshake packet-type { request-identity | srp-sha1-part2 }
The type of 802.1X authentication handshake packets is configured.
By default, the type of 802.1X authentication handshake packets is request-identity.
To ensure interoperability with devices from other vendors, you can configure the handshake packet type based on your networking requirements.
Run dot1x timer handshake-period handshake-period-value
The interval at which the device handshakes with online 802.1X users on non-Eth-Trunk interfaces is configured.
By default, the interval for sending handshake packets to online 802.1X users on non-Eth-Trunk interfaces is 15 seconds.
Run dot1x timer eth-trunk-access handshake-period handshake-period-value
The interval at which the device handshakes with online 802.1X users on Eth-Trunks is configured.
By default, the interval for sending handshake packets to online 802.1X users on Eth-Trunks is 120 seconds.
Run dot1x retry max-retry-value
The number of times a handshake packet is retransmitted to an 802.1X user is configured.
By default, the device retransmits a handshake packet to an 802.1X user twice.
The device is configured to send EAP packets with a code number to 802.1X users.
By default, the device does not send EAP packets with a code number to 802.1X users.
If an H3C iMC functions as the RADIUS server, run the dot1x eap-notify-packet eap-code 10 data-type 25 command on the device.
The device is configured to automatically generate DHCP snooping binding entries after static IP users pass 802.1X authentication or when the users are in pre-connection state.
By default, the device does not automatically generate DHCP snooping binding entries after static IP users pass 802.1X authentication or when the users are in pre-connection state.
The function of not responding to the authentication triggering packets sent by clients when the AAA server is Down is enabled.
By default, the device responds to the authentication triggering packets sent by clients when the AAA server is Down.
This function needs to be configured when Cisco AnyConnect is used for packet-triggered authentication.