Supported Platforms
Related Documentation
- EX Series
- 802.1X for EX Series Switches Overview
- Example: Setting Up 802.1X for Single Supplicant or Multiple Supplicant Configurations on an EX Series Switch
- Configuring 802.1X Interface Settings (CLI Procedure)
- Configuring MAC RADIUS Authentication (CLI Procedure)
- Configuring Captive Portal Authentication (CLI Procedure)
- Configuring Static MAC Bypass of Authentication (CLI Procedure)
- Controlling Authentication Session Timeouts (CLI Procedure)
- Authentication Process Flow for EX Series Switches
Understanding Authentication on EX Series Switches
You can control access to your network through a Juniper Networks EX Series Ethernet Switch using several different authentication methods—802.1X, MAC RADIUS, or captive portal. Authentication prevents unauthorized devices and users from gaining access to your LAN. For 802.1X and MAC RADIUS authentication, end devices must be authenticated before they receive an IP address from a DHCP server. For captive portal authentication, the switch allows the end devices to get an IP address and allows forwarding of DHCP, DNS, and ARP packets.
You can allow end devices to access the network without authentication by including the MAC address of the end device in the static MAC bypass list or, for captive portal, by including the MAC address of the end device in the authentication whitelist.
You can configure 802.1X, MAC RADIUS, and captive portal on the same interface and in any combination, except that you cannot configure MAC RADIUS and captive portal on an interface without also configuring 802.1X. If you configure multiple authentication methods on a single interface, the switch falls back to another method if the first method is unsuccessful. For a description of the process flow when multiple authentication methods are configured on an interface, see Authentication Process Flow for EX Series Switches.
This topic covers:
Sample Basic Authentication Topology
Figure 1 illustrates a basic deployment topology for authentication on an EX Series switch:
Figure 1: Example Authentication Topology

802.1X Authentication
802.1X is an IEEE standard for port-based network access control (PNAC). It provides an authentication mechanism to allow devices to access a LAN. The 802.1X authentication feature on an EX Series switch is based upon the IEEE 802.1D standard Port-Based Network Access Control.
The communication protocol between the end device and the switch is Extensible Authentication Protocol Over LAN (EAPoL). EAPoL is a version of EAP designed to work with Ethernet networks. The communication protocol between the authentication server and the switch is RADIUS.
During the authentication process, the switch completes multiple message exchanges between the end device and the authentication server. While 802.1X authentication is in process, only 802.1X traffic is allowed. Other traffic, such as DHCP and HTTP, is blocked at the data link layer.
![]() | Note: You can configure both the maximum number of times an EAPoL request packet is retransmitted and the timeout period between attempts. For information, see Configuring 802.1X Interface Settings (CLI Procedure). |
An 802.1X authentication configuration for a LAN contains three basic components:
- Supplicant (also called end device)—Supplicant
is the IEEE term for an end device that requests to join the network.
The end device can be responsive or nonresponsive. A responsive end
device is 802.1X-enabled and provides authentication credentials—specifically,
a username and password for EAP MD5 or a username and client certificates
for EAP-TLS, EAP-TTLS, and EAP-PEAP.
You can configure a server-reject VLAN to provide limited LAN access for responsive end devices that are 802.1X-enabled but that have sent the wrong credentials. A server-reject VLAN can provide a remedial connection, typically just to the Internet, for these devices. SeeExample: Configuring Fallback Options on EX Series Switches for EAP-TTLS Authentication and Odyssey Access Clients for additional information.
Note: If the end device that is authenticated using the server-reject VLAN is an IP phone, voice traffic is not allowed.
A nonresponsive end device is not 802.1X-enabled, but it can be authenticated through MAC RADIUS authentication.
- Authenticator port access entity—The IEEE term for the authenticator. The EX Series switch is the authenticator, and it controls access by blocking all traffic to and from end devices until they are authenticated.
- Authentication server—The authentication server contains the backend database that makes authentication decisions. It contains credential information for each end device that is allowed to connect to the network. The authenticator forwards credentials supplied by the end device to the authentication server. If the credentials forwarded by the authenticator match the credentials in the authentication server database, access is granted. If the credentials forwarded do not match, access is denied. The EX Series switches support RADIUS authentication servers.
![]() | Note: You cannot configure 802.1X authentication on redundant trunk groups (RTGs). For more information on RTGs, see Understanding Redundant Trunk Links. |
MAC RADIUS Authentication
You can configure MAC RADIUS authentication on interfaces that are connected to end devices that are not 802.1X-enabled but that you want to allow to access the LAN.
The EAP method supported for MAC RADIUS authentication on EX Series switches is EAP-MD5.
If both 802.1X-enabled end devices and end devices that are not 802.1X-enabled connect to an interface, you can configure both 802.1X and MAC RADIUS authentication methods on the interface. In this case, the switch first attempts to authenticate using 802.1X, and if that method fails, it attempts to authenticate the end device using MAC RADIUS authentication.
If you know that only non-802.1X-enabled end devices connect on that interface, you can eliminate the delay that occurs while the switch determines that the end device is non-802.1X-enabled by configuring the mac-radius restrict option. When this option is configured, the switch does not attempt to authenticate the end device through 802.1X but instead immediately sends a request to the RADIUS server for authentication of the MAC address of the end device. If the MAC address of an end device is configured as permitted on the RADIUS server, the switch opens LAN access to the end device on the interface to which it is connected.
This option is useful when no other 802.1X authentication methods, such as guest VLAN, are needed on the interface. When you configure mac-radius restrict on an interface to eliminate this delay, the switch drops all 802.1X packets.
Captive Portal Authentication
Captive portal authentication (hereafter referred to as captive portal) allows you to authenticate users on EX Series switches by redirecting Web browser requests to a login page that requires users to input a username and password before they are allowed access to the network. Captive portal controls network access by requiring users to provide information that is authenticated against a RADIUS server database using EAP-MD5. You can also use captive portal to display an acceptable-use policy to users before they access your network.
Juniper Networks Junos operating system (Junos OS) for EX Series switches provides a template that allows you to easily design and modify the look of the captive portal login page. You enable specific interfaces for captive portal. The first time an end device connected to a captive portal interface attempts to access a web page, the switch presents the captive portal login page. Upon successful authentication, the user is allowed access to the network and to continue to the original page requested.
![]() | Note: If Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) is enabled, Hypertext Transfer Protocol (HTTP) requests are redirected to an HTTPS connection for the captive portal authentication process. After authentication, the end device is returned to the HTTP connection. |
If there are end devices that are not HTTP-enabled connected to the captive portal interface, you can allow them to bypass captive portal authentication by adding their MAC addresses to an authentication whitelist.
When the user is authenticated by the RADIUS server, any per-user policies (attributes) associated with that user are also sent to the switch.
Captive portal on EX Series switches has the following limitations:
- The captive portal interface must be configured for family ethernet-switching and set to port mode access.
- Captive portal does not support dynamic assignment of VLANs downloaded from the RADIUS server.
- If the user is idle for more than about 5 minutes and there is no traffic passed, the user must log back in to the captive portal.
Static MAC Bypass of Authentication
You can allow end devices to access the LAN without authentication on a RADIUS server by including their MAC addresses in the static MAC bypass list (also known as the exclusion list).
You might choose to include a device in the bypass list to:
- Allow non-802.1X-enabled devices access to the LAN.
- Eliminate the delay that occurs while the switch determines that a connected device is a non-802.1X-enabled host.
When you configure static MAC on the switch, the MAC address of the end device is first checked in a local database (a user-configured list of MAC addresses). If a match is found, the end device is successfully authenticated and the interface is opened up for it. No further authentication is done for that end device. If a match is not found and 802.1X authentication is enabled on the switch, the switch attempts to authenticate the end device through the RADIUS server.
For each MAC address, you can also configure the VLAN to which the end device is moved or the interfaces on which the host connects.
![]() | Caution: When you clear the learned MAC addresses from an interface using the clear dot1x interface command, all MAC addresses are cleared, including those in the static MAC bypass list. |
Fallback of Authentication Methods
You can configure multiple authentication methods on a single interface to enable fallback to another method if one method fails.
If an interface is configured in multiple supplicant mode, all end devices connecting through the interface must use either captive portal or a combination of 802.1X and MAC RADIUS, captive portal cannot be mixed with 802.1X or MAC RADIUS. Therefore, if there is already an end device on the interface that was authenticated through 802.1X or MAC RADIUS authentication, then additional end devices authenticating do not fall back to captive portal. If only 802.1X authentication or MAC RADIUS authentication is configured, some end devices can be authenticated using 802.1X and others can still be authenticated using MAC RADIUS.
Fallback of authentication methods occurs in the following order:
- 802.1X authentication—If 802.1X is configured on the interface, the switch sends EAPoL requests to the end device and attempts to authenticate the end device through 802.1X authentication. If the end device does not respond to the EAP requests, the switch checks whether MAC RADIUS authentication is configured on the interface.
- MAC RADIUS authentication—If MAC RADIUS authentication is configured on the interface, the switch sends the MAC RADIUS address of the end device to the authentication server. If MAC RADIUS authentication is not configured, the switch checks whether captive portal is configured on the interface.
- Captive portal authentication—If captive portal is configured on the interface, the switch attempts to authenticate using this method after attempting any other configured authentication methods. If an end device is authenticated on the interface using captive portal, this becomes the active authentication method on the interface. When captive portal is the active authentication method, the switch falls back to 802.1X authentication if there are no sessions in the authenticated state and if the interface receives an EAP packet.
Related Documentation
- EX Series
- 802.1X for EX Series Switches Overview
- Example: Setting Up 802.1X for Single Supplicant or Multiple Supplicant Configurations on an EX Series Switch
- Configuring 802.1X Interface Settings (CLI Procedure)
- Configuring MAC RADIUS Authentication (CLI Procedure)
- Configuring Captive Portal Authentication (CLI Procedure)
- Configuring Static MAC Bypass of Authentication (CLI Procedure)
- Controlling Authentication Session Timeouts (CLI Procedure)
- Authentication Process Flow for EX Series Switches
Published: 2014-04-23
Supported Platforms
Related Documentation
- EX Series
- 802.1X for EX Series Switches Overview
- Example: Setting Up 802.1X for Single Supplicant or Multiple Supplicant Configurations on an EX Series Switch
- Configuring 802.1X Interface Settings (CLI Procedure)
- Configuring MAC RADIUS Authentication (CLI Procedure)
- Configuring Captive Portal Authentication (CLI Procedure)
- Configuring Static MAC Bypass of Authentication (CLI Procedure)
- Controlling Authentication Session Timeouts (CLI Procedure)
- Authentication Process Flow for EX Series Switches