<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sample SecureStack Configuration for 802.1x, EAP, RFC3580, and MUA in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/sample-securestack-configuration-for-802-1x-eap-rfc3580-and-mua/m-p/43105#M152</link>
    <description>Article ID: 10283 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
SecureStack C3, all firmware&lt;BR /&gt;
SecureStack C2, firmware 4.00.24 and higher&lt;BR /&gt;
SecureStack B3, all firmware&lt;BR /&gt;
SecureStack B2, firmware 3.01.16 and higher&lt;BR /&gt;
SecureStack A2, firmware 1.03.17 and higher &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
Sample configuration &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
Here is a sample SecureStack configuration which activates Radius Server access to use the dot1x/eapol protocols (basic 802.1x authentication), and then adds vlanauthorization (RFC3580 VLAN Assignment) and multiauth (Multi-User Authentication, MUA) on top of that. &lt;BR /&gt;
&lt;BR /&gt;
#eapol&lt;BR /&gt;
set dot1x enable                       [globally enable 802.1x for server support]&lt;BR /&gt;
set dot1x auth-config authcontrolled-portcontrol forced-auth fe.1.48 [assumed authentication on the server and ISL ports]&lt;BR /&gt;
set eapol enable                      [globally enable EAP for supplicant support]&lt;BR /&gt;
set eapol auth-mode forced-auth fe.1.48 [assumed authentication on the server and ISL ports]&lt;BR /&gt;
!&lt;BR /&gt;
#ip &lt;BR /&gt;
set ip address 10.20.1.2 mask 255.255.255.0 gateway 10.20.1.254 [assign a switch host IP address]&lt;BR /&gt;
! &lt;BR /&gt;
#multiauth                          [multi (vs strict) mode is enabled by default] &lt;BR /&gt;
set multiauth port mode auth-reqd fe.1.1 [force the supplicant ports to authenticate]&lt;BR /&gt;
set multiauth port mode force-auth fe.1.48 [assumed authentication on the server and ISL ports]&lt;BR /&gt;
!&lt;BR /&gt;
#radius &lt;BR /&gt;
set radius enable                      [globally enable radius for server support]&lt;BR /&gt;
set radius server 1 10.20.1.5 1812 :60d37a4d84c19a3c29672b16f71665479d0fd9b152c5f54c0227070b &lt;BR /&gt;
! &lt;BR /&gt;
#vlanauthorization &lt;BR /&gt;
set vlanauthorization enable             [globally enable RFC3580 VLAN assignment]&lt;BR /&gt;
set vlanauthorization enable fe.1.1 [specifically enable RFC3580 for supplicant ports]&lt;BR /&gt;
A common issue with use of multiauth is that users are by default not forced to authenticate (though they may optionally initiate authentication via an EAPOL Start frame). With this non-Strict multiauth configuration, users are required to 802.1x-authenticate for a possible Policy/VLAN reassignment, but will fall back to their default port Role/VLAN if authentication fails. &lt;BR /&gt;
&lt;BR /&gt;
An exception to the use of the 'set multiauth port mode force-auth fe.1.48' command is if RADIUS Snooping is being used, in which case use "multiauth auth-opt" (e.g. 'set multiauth port mode auth-opt fe.1.48') for Snooping ports as advised in &lt;A href="http://bit.ly/1bb6SCq" target="_blank" rel="nofollow noreferrer noopener"&gt;11759&lt;/A&gt;. &lt;BR /&gt;
&lt;BR /&gt;
See also: &lt;A href="http://bit.ly/19LXsqz" target="_blank" rel="nofollow noreferrer noopener"&gt;5532&lt;/A&gt;, &lt;A href="http://bit.ly/1bW8zCe" target="_blank" rel="nofollow noreferrer noopener"&gt;7312&lt;/A&gt;, &lt;A href="http://bit.ly/1foJEKU" target="_blank" rel="nofollow noreferrer noopener"&gt;11537&lt;/A&gt;, and &lt;A href="http://bit.ly/18oGBhD" target="_blank" rel="nofollow noreferrer noopener"&gt;12499&lt;/A&gt;.</description>
    <pubDate>Thu, 05 Sep 2013 06:04:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-09-05T06:04:00Z</dc:date>
    <item>
      <title>Sample SecureStack Configuration for 802.1x, EAP, RFC3580, and MUA</title>
      <link>https://community.extremenetworks.com/t5/faqs/sample-securestack-configuration-for-802-1x-eap-rfc3580-and-mua/m-p/43105#M152</link>
      <description>Article ID: 10283 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
SecureStack C3, all firmware&lt;BR /&gt;
SecureStack C2, firmware 4.00.24 and higher&lt;BR /&gt;
SecureStack B3, all firmware&lt;BR /&gt;
SecureStack B2, firmware 3.01.16 and higher&lt;BR /&gt;
SecureStack A2, firmware 1.03.17 and higher &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
Sample configuration &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
Here is a sample SecureStack configuration which activates Radius Server access to use the dot1x/eapol protocols (basic 802.1x authentication), and then adds vlanauthorization (RFC3580 VLAN Assignment) and multiauth (Multi-User Authentication, MUA) on top of that. &lt;BR /&gt;
&lt;BR /&gt;
#eapol&lt;BR /&gt;
set dot1x enable                       [globally enable 802.1x for server support]&lt;BR /&gt;
set dot1x auth-config authcontrolled-portcontrol forced-auth fe.1.48 [assumed authentication on the server and ISL ports]&lt;BR /&gt;
set eapol enable                      [globally enable EAP for supplicant support]&lt;BR /&gt;
set eapol auth-mode forced-auth fe.1.48 [assumed authentication on the server and ISL ports]&lt;BR /&gt;
!&lt;BR /&gt;
#ip &lt;BR /&gt;
set ip address 10.20.1.2 mask 255.255.255.0 gateway 10.20.1.254 [assign a switch host IP address]&lt;BR /&gt;
! &lt;BR /&gt;
#multiauth                          [multi (vs strict) mode is enabled by default] &lt;BR /&gt;
set multiauth port mode auth-reqd fe.1.1 [force the supplicant ports to authenticate]&lt;BR /&gt;
set multiauth port mode force-auth fe.1.48 [assumed authentication on the server and ISL ports]&lt;BR /&gt;
!&lt;BR /&gt;
#radius &lt;BR /&gt;
set radius enable                      [globally enable radius for server support]&lt;BR /&gt;
set radius server 1 10.20.1.5 1812 :60d37a4d84c19a3c29672b16f71665479d0fd9b152c5f54c0227070b &lt;BR /&gt;
! &lt;BR /&gt;
#vlanauthorization &lt;BR /&gt;
set vlanauthorization enable             [globally enable RFC3580 VLAN assignment]&lt;BR /&gt;
set vlanauthorization enable fe.1.1 [specifically enable RFC3580 for supplicant ports]&lt;BR /&gt;
A common issue with use of multiauth is that users are by default not forced to authenticate (though they may optionally initiate authentication via an EAPOL Start frame). With this non-Strict multiauth configuration, users are required to 802.1x-authenticate for a possible Policy/VLAN reassignment, but will fall back to their default port Role/VLAN if authentication fails. &lt;BR /&gt;
&lt;BR /&gt;
An exception to the use of the 'set multiauth port mode force-auth fe.1.48' command is if RADIUS Snooping is being used, in which case use "multiauth auth-opt" (e.g. 'set multiauth port mode auth-opt fe.1.48') for Snooping ports as advised in &lt;A href="http://bit.ly/1bb6SCq" target="_blank" rel="nofollow noreferrer noopener"&gt;11759&lt;/A&gt;. &lt;BR /&gt;
&lt;BR /&gt;
See also: &lt;A href="http://bit.ly/19LXsqz" target="_blank" rel="nofollow noreferrer noopener"&gt;5532&lt;/A&gt;, &lt;A href="http://bit.ly/1bW8zCe" target="_blank" rel="nofollow noreferrer noopener"&gt;7312&lt;/A&gt;, &lt;A href="http://bit.ly/1foJEKU" target="_blank" rel="nofollow noreferrer noopener"&gt;11537&lt;/A&gt;, and &lt;A href="http://bit.ly/18oGBhD" target="_blank" rel="nofollow noreferrer noopener"&gt;12499&lt;/A&gt;.</description>
      <pubDate>Thu, 05 Sep 2013 06:04:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/sample-securestack-configuration-for-802-1x-eap-rfc3580-and-mua/m-p/43105#M152</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-09-05T06:04:00Z</dc:date>
    </item>
  </channel>
</rss>

