The IEEE-802.1X authentication provides a security standard for network access control with RADIUS servers and holds a network port disconnected until authentication is completed. With 802.1X authentication, the supplicant provides credentials, such as user name, password, or digital certificate to the authenticator, and the authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network. The Switch uses 802.1X to enable or disable port access control, to enable or disable the Guest VLAN, and to enable or disable the forwarding EAPOL (Extensible Authentication Protocol over LANs) frames.
Enable 802.1X Authentication:

Enable RADIUS server

EXAMPLE:Â Let us consider that the RADIUS server is connected to port 1 of the switch and has static IP: 192.168.181.100. The PC that needs be authenticated is connected to port 5 on the switch which is portshielded to interface X0. Once it is successfully authenticated it should get an IP on the X0 subnet.
Topology:

The following changes are required on the RADIUS server to achieve connectivity and perform authentication:













The following changes are required on the end machine connected to port 5 to be able to successfully authenticate using 802.1X authentication against the RADIUS server:




We also need to enable authentication using 802.1X on the required port on the switch. In this example, it is port 5 on the switch.

Now when the user logs in with a Domain User credentials on the end machine connected to port 5, it is authenticated against the RADIUS server and receives an IP from X0 subnet.
The following log message show up during successful authentication:
