BOUE said:
Someone can explain the "aaa port-access authenticator control" command because I want to allow both 802.1X compliant client a not 802.1X compliant to acces netwok ?
jeff reply:
this commands dictates how the switch will control 802.1X enabled ports...
default is auto, meaning if the device authenticates via radius, do what radius says...if device doesn't authenticate, then switch blocks that port...
on - means don't try to authenticate at all, just let all traffic pass...
off - don't allow traffic at all, even if the device trys to authenticate...
BOUE said:
I set it in auto mode and when I connect a not 802.1X compliant I doesn't have acces to the network.
jeff reply:
that is correct function
BOUE said:
I want that 802.1X compliant clients use dynamic attribution VLAN and use static VLAN defined on the port for not 802.1X compliant clients.
jeff reply, then the way to configure that 802.1X function is to define what is called the "unauthenticated vlan"...this is generally not the vlan the ports are statically assigned to, and i've never tried it to be, i always define a separate vlan...
so, to configure this:
1) create a vlan
2) control is access to the network via ACL(s)
3) provide the vlan with DHCP services and ip-helper on the vlan
4) then this command:
'aaa port-access authenticator <PORTS> unauth-vid<X>'
hth...jeff
ps, i looked at the event info you provided earlier (running the french thru a translator on google), but the messages viewed didn't really tell me anything...it didn't look like they were the radius messages...
so i assume that is why you are looking at this other option...
cheers..jeff</X></PORTS>