How to Set Up 802.1X Authentication in Cisco Packet Tracer

In today’s enterprise network environments, the implementation of NAC (Network Access Control) is no longer optional, but it is mandatory. One of the most robust and widely used protocols for port-based network access control is IEEE 802.1X. 802.1X is a framework through which we implement authentication at Layer 2. It acts as a guard that authenticates users who want to connect to a LAN or WLAN network.

802.1X works in the form of client-server architecture, where the user also called the supplicant, acts as a client. The authenticator, such as a switch or a wireless controller, controls access to the network based on the authentication status of the endpoint. Finally, the authentication server, such as a RADIUS server, receives the information from the authenticator and validates the identity information sent originally by the supplicant. The server will respond with a RADIUS either accept or reject message, which is sent back to the authenticator.

            802.1X uses Extensible Authentication Protocol (EAP) for communication between the user (supplicant) and the RADIUS server (authentication server).

Lab for 802.1x in Packet Tracer

The following lab topology will be used for the Dot1x authentication method.

802.1X lab diagram

Connect all the devices as given in the diagram and configure all the IP addresses of the PCs, server, and Switches.

After configuring PCs IPs, configure the server as AAA server and its other configurations as given in the diagram.

 configuring AAA Radius server for 802.1x

The next step in the RADIUS server is to create usernames and passwords for PCs.

Create 5 usernames and passwords such as PC1 having username pc1 and password pc1.

configuring 802.1x username and passowrd

The next step in the RADIUS server is to enable EAP-MD5 service. For this, go to RADIUS EAP and tick the box for allow EAP-MD5.

configure EAP in AAA

Configure the switch with basic settings such as below;

 configuring of switch

Now configure the DOT1X authentication on all three switches as given below. Here we are configuring switch, and you should configure the other two switches in the same way with their respective interfaces.

802.1x configuration on switch

Check the interface fast Ethernet 0/1 at switch1. It’s color is orange color which indicates that there is an issue.

The reason is we didn’t active 802.1x on the PC1. How to active 802.1x authentication on PC1. Check it below:

enabling 802.1x on pc

As we activate 802.1X on PC1, check again its interfaces status;

 check interface fa 01 again

Ping from PC1 to RADIUS server;

ping after dot1x

In the same way configure all the other PCs in the topology for dot1x authentication.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *