interface (802.1X)
Syntax
interface (all | [ interface-names ]) { authentication-order (captive-portal | dot1x | mac-radius); disable; eapol-block { captive-portal; mac-radius; server-fail <block-interval>; } guest-bridge-domain guest-bridge-domain; guest-gbp-tag guest-gbp-tag guest-vlan guest-vlan (vlan-id | vlan-name; ignore-port-bounce; mac-radius { authentication-protocol { eap-md5; eap-peap { resume; } pap; } flap-on-disconnect; restrict; } maximum-requests number; multi-domain { max-data-session max-data-session; packet-action (drop-and-log | shutdown); recovery-timeout seconds; } (no-reauthentication | reauthentication seconds ); no-tagged-mac-authentication; quiet-period seconds; redirect-url redirect-url; retain-mac-aged-session; retries number; server-fail (bridge-domain bridge-domain | deny | permit | use-cache | vlan-name vlan-name) gbp-tag gbp-tag; server-fail-voip (deny | permit | use-cache | vlan-name vlan-name); server-reject-bridge-domain | server-reject-vlan identifier { block-interval block-interval; eapol-block; } server-timeout seconds; supplicant (single | single-secure | multiple); supplicant-timeout seconds; transmit-period seconds; }
Hierarchy Level
[edit logical-systems name protocols dot1x authenticator], [edit protocols dot1x authenticator]
Description
Configure IEEE 802.1X authentication for Port-Based Network Access Control for all interfaces or for specific interfaces.
Options
(all | [ interface-names ]) |
Configure either a list of interface names or all interfaces for 802.1x authentication. |
disable |
Disable 802.1X authentication on a specified interface or all interfaces.
|
guest-bridge-domain guest-bridge-domain |
(MX Series only) Specify the bridge domain tag identifier or the name of the guest bridge domain to which an interface is moved when no 802.1X supplicants are connected on the interface. The bridge domain specified must already exist on the device. |
guest-gbp-tag |
(EX or QFX Series) Specify the GBP tag to apply when an interface is
moved to a guest VLAN. If the
|
guest-vlan (vlan-id | vlan-name |
(EX, QFX, and SRX Series only) Specify the VLAN tag identifier or the name of the guest VLAN to which an interface is moved. The VLAN specified must already exist on the device. Guest VLANs can be configured on devices that are using 802.1X authentication to provide limited access—typically only to the Internet—for corporate guests. A guest VLAN is not used for supplicants that send incorrect credentials. Those supplicants are directed to the server-reject VLAN instead. |
ignore-port-bounce |
Ignore the port-bounce command contained in a Change of Authorization (CoA) request. CoA requests are RADIUS messages that are used to dynamically modify an authenticated user session already in progress. CoA requests are sent from the authentication, authorization, and accounting (AAA) server to the device, and are typically used to change the VLAN for the host based on device profiling. End devices such as printers do not have a mechanism to detect the VLAN change, so they do not renew the lease for their DHCP address in the new VLAN. The port-bounce command is used to force the end device to initiate DHCP re-negotiation by causing a link flap on the authenticated port.
|
maximum-requests number |
Specify the maximum number of times an EAPoL request packet is retransmitted to the supplicant before the authentication session times out.
|
no-reauthentication | reauthentication seconds |
Either disable reauthentication or configure the number of seconds before the 802.1X authentication session times out and the client must reattempt authentication. Note:
If the authentication server sends an authentication session timeout
to the client, this takes priority over the value configured locally
using the
|
no-tagged-mac-authentication |
Don’t allow a tagged MAC address for RADIUS authentication. |
quiet-period seconds |
Specify the number of seconds the interface remains in the wait state following a failed authentication attempt by a supplicant before reattempting authentication.
|
redirect-url redirect-url |
Specify a URL that redirects unauthenticated hosts to a central Web authentication (CWA) server. The CWA server provides a web portal where the user can enter a username and password. If these credentials are validated by the CWA server, the user is authenticated and is allowed access to the network. The redirect URL for central Web authentication can be configured
centrally on the AAA server or locally on the switch. Use the
The redirect URL and a dynamic firewall filter must both be present for the central Web authentication process to be triggered. For more information about configuring the redirect URL and the dynamic firewall filter for central Web authentication, see Configuring Central Web Authentication. Note:
When the dynamic firewall filter is configured using the special Filter-ID attribute JNPR_RSVD_FILTER_CWA, the CWA redirect URL must include the IP address of the AAA server, for example, https://10.10.10.10.
|
request-retry-count number |
Configure the authentication server to retry sending an EAP request to the supplicant. This can help prevent a timeout of the authentication session due to an unresponsive supplicant. The number of retries is based on the configured value.
|
retain-mac-aged-session |
Keep the IEEE 802.1X clients active even after their MAC addresses age out, and relearn the MAC addresses again.
|
retries number |
Specify the number of times the device attempts to authenticate the port
after an initial failure. When the limit is exceeded, the port waits to
reattempt authentication for the number of seconds specified with the
|
server-fail (bridge-domain bridge-domain | deny | permit | use-cache | vlan-name vlan-name) gbp-tag gbp-tag |
Specify how end devices connected to a device are supported if the RADIUS authentication server becomes unavailable. Server fail fallback is triggered most often during reauthentication when the already configured and in-use RADIUS server becomes inaccessible. However, server fail fallback can also be triggered by a supplicant’s initial attempt at authentication through the RADIUS server. You must specify an action that the device applies to end devices when the authentication servers are unavailable. The device can accept or deny access to supplicants or maintain the access already granted to supplicants before the RADIUS timeout occurred. You can also configure the switch to move the supplicants to a specific VLAN or bridge domain. The VLAN or bridge domain must already be configured on the device. Note:
The
|
server-fail-voip (deny | permit | use-cache | vlan-name vlan-name) |
(EX, QFX Series only) Specify how VoIP clients sending voice traffic are supported if the RADIUS authentication server becomes unavailable. Server fail fallback is triggered most often during reauthentication when the already configured and in-use RADIUS server becomes inaccessible. However, server fail fallback can also be triggered by a VoIP client’s initial attempt at authentication through the RADIUS server. You must specify an action that the switch applies to VoIP clients when the authentication servers are unavailable. The switch can accept or deny access to VoIP clients or maintain the access already granted to clients before the RADIUS timeout occurred. You can also configure the switch to move the VoIP clients to a specific VLAN. The VLAN must already be configured on the switch. The Note:
An option other than
|
server-timeout seconds |
Specify the amount of time a port will wait for a reply when relaying a response from the supplicant to the authentication server before timing out and invoking the server-fail action.
|
supplicant (single | single-secure | multiple) |
Specify the MAC-based method used to authenticate clients.
|
supplicant-timeout seconds |
Specify the number of seconds the port waits for a response when relaying a request from the authentication server to the supplicant before re-sending the request.
|
transmit-period seconds |
Specify the number of seconds the port waits before retransmitting the initial EAPoL PDUs to the supplicant.
|
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details.
Required Privilege Level
routing—To view this statement in the configuration.routing-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 9.0.
gbp-tag
gbp-tag and guest-gbp-tag
guest-gbp-tag
introduced in Junos OS Release
23.4R1 for EX and QFX Series switches.
server-reject-vlan
introduced in Junos OS Release 9.3 for EX Series
switches.
eapol-block
introduced in Junos OS Release 11.2.
authentication-order
and redirect-url
introduced in
Junos OS Release 15.1R3.
server-fail-voip
introduced in Junos OS Releases 14.1X53-D40 and
15.1R4 for EX and QFX Series switches.
ignore-port-bounce
introduced in Junos OS Release 17.3R1.
multi-domain
introduced in Junos OS Release 18.3R1.