以下内容,是《
原书1179页,可以把人看到吐血而死。
之所以翻译这个,是因为目前国内介绍到思科交换机的这个功能的中文文献(指公开文献)为0.000???。可以说,基本无人翻译介绍过。
而思科的IEEE 802.1x协议的实现,又与目前国内华为、锐捷、神州数码等厂商实现的细节有很大不同。自己之前做某些配置的时候,完全被误导。以至于。。。。。。。
大家看看吧,内行看门道,外行人也看看人行道。呵呵
Using IEEE 802.1x Authentication with MAC Authentication Bypass
基于
You can configure the switch to authorize clients based on the client MAC address (see Figure 9-2 onpage 9-4) by using the MAC authentication bypass feature. For example, you can enable this feature on IEEE 802.1x ports connected to devices such as printers.
你可以配置交换机使用基于客户端mac
If IEEE 802.1x authentication times out while waiting for an EAPOL response from the client, the switch tries to authorize the client by using MAC authentication bypass.
如果交换机等待客户端返回一个IEEE 802.1x
When the MAC authentication bypass feature is enabled on an IEEE 802.1x port, the switch uses the MAC address as the client identity.
当某个IEEE 802.1x
The authentication server has a database of client MAC addresses that are allowed network access. After detecting a client on an IEEE 802.1x port, the switch waits for an Ethernet packet from the client. The switch sends the authentication server a RADIUS-access/request frame with a username and password based on the MAC address. If authorization succeeds, the switch grants the client access to the network. If authorization fails, the switch assigns the port to the guest VLAN if one is configured.
交换机检测到某个客户端连接到IEEE 802.1x
If an EAPOL packet is detected on the interface during the lifetime of the link, the switch determines that the device connected to that interface is an IEEE 802.1x-capable supplicant and uses IEEE 802.1x authentication (not MAC authentication bypass) to authorize the interface. EAPOL history is cleared if the interface link status goes down.
如果在端口连接过程中,(mac
If the switch already authorized a port by using MAC authentication bypass and detects an IEEE 802.1x supplicant, the switch does not unauthorize the client connected to the port. When re-authentication occurs, the switch uses IEEE 802.1x authentication as the preferred re-authentication process if the previous session ended because the Termination-Action RADIUS attribute value is DEFAULT.
使用基于mac
Clients that were authorized with MAC authentication bypass can be re-authenticated. The re-authentication process is the same as that for clients that were authenticated with IEEE 802.1x. During re-authentication, the port remains in the previously assigned VLAN. If re-authentication is successful, the switch keeps the port in the same VLAN. If re-authentication fails, the switch assigns the port to the guest VLAN, if one is configured.
采用基于mac
If re-authentication is based on the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS attribute (Attribute [29]) and if the Termination-Action RADIUS attribute (Attribute [29]) action is Initialize, (the attribute value is DEFAULT), the MAC authentication bypass session ends, and connectivity is lost during re-authentication. If MAC authentication bypass is enabled and the IEEE 802.1x authentication times out, the switch uses the MAC authentication bypass feature to initiate re-authorization. For more information about these AV pairs, see RFC 3580, “IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines.”
如果配置重认证的发起是基于RADIUS
重认证发起后,同样需要一个IEEE 802.1x
MAC authentication bypass interacts with the features:
基于mac
●你只能够在一个已经启用了IEEE 802.1x
●如果配置了Guest VLAN
●基于mac
●关于端口安全的相关内容,请参考“Using IEEE 802.1x Authentication with Port Security”
●关于Voice VLAN
●配置了基于mac
●IEEE802.1x
●配置了基于mac
? IEEE 802.1x authentication—You can enable MAC authentication bypass only if IEEE 802.1x authentication is enabled on the port.
? Guest VLAN—If a client has an invalid MAC address identity, the switch assigns the client to a guest VLAN if one is configured.
? Restricted VLAN—This feature is not supported when the client connected to an IEEE 802.lx port is authenticated with MAC authentication bypass.
? Port security—See the “Using IEEE 802.1x Authentication with Port Security” section on page 9-15.
? Voice VLAN—See the “Using IEEE 802.1x Authentication with Voice VLAN Ports” section on page 9-15.
? VLAN Membership Policy Server (VMPS)—IEEE802.1x and VMPS are mutually exclusive.
? Private VLAN—You can assign a client to a private VLAN.
? Network admission control (NAC) Layer 2 IP validation—
============暂不提供转载==========