Layer 2 (Data Link Layer) is the foundation of network communication, and securing it is critical because it ensures that only authorized devices can connect to the network.
Threats at Layer 2:
Solutions:
Key Features:
Definition:
Entities in 802.1X:
Authentication Process:
Benefits:
Definition:
How It Works:
Limitations:
Definition:
How It Works:
Configuration Example:
set vlans guest-vlan vlan-id 100
set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan members guest-vlan
set protocols dot1x guest-vlan guest-vlan
Enable 802.1X on an Interface:
set protocols dot1x interface ge-0/0/1 supplicant
Define the Supplicant:
Set the RADIUS Server IP and Shared Secret:
set access radius-server 192.0.2.10 secret key123
Associate RADIUS with 802.1X:
Verify RADIUS Server Availability:
show access radius-server
Configure backup RADIUS servers for high availability.
set access radius-server 192.0.2.11 secret backupkey
Symptom:
Possible Causes:
Troubleshooting Steps:
Verify RADIUS configuration:
show access radius-server
Check the Supplicant’s settings for 802.1X.
Use the following command to debug RADIUS communication:
show log messages
Symptom:
Possible Causes:
Troubleshooting Steps:
Verify VLAN membership on the interface:
show configuration interfaces ge-0/0/1
Ensure the Guest VLAN is correctly configured in 802.1X:
show protocols dot1x
Symptom:
Possible Causes:
Troubleshooting Steps:
Check network latency to the RADIUS server:
ping 192.0.2.10
Ensure the RADIUS server has sufficient resources.
Verify 802.1X Status on an Interface:
show dot1x interface ge-0/0/1
View Authentication Logs:
show log messages | match radius
Check Active Sessions:
show dot1x sessions
Configuration:
Enable 802.1X:
set protocols dot1x interface ge-0/0/1 supplicant
Configure RADIUS:
set access radius-server 192.0.2.10 secret key123
Configuration:
Enable MAC Authentication:
set protocols dot1x interface ge-0/0/2 mac-radius
Assign a VLAN for IoT devices:
set vlans iot-vlan vlan-id 200
set interfaces ge-0/0/2 unit 0 family ethernet-switching vlan members iot-vlan
Configuration:
Define a Guest VLAN:
set vlans guest-vlan vlan-id 300
Configure 802.1X to assign unauthenticated devices to the Guest VLAN:
set protocols dot1x guest-vlan guest-vlan
Example RADIUS Attributes:
Scenario:
Solution:
set access radius-server 192.0.2.11 secret backupkey
When 802.1X is enabled on a switch port, no traffic is allowed until the device successfully authenticates.
This includes:
Blocking DHCP, ARP, and even ping requests.
Preventing unauthorized devices from interacting with the network in any way.
To provide limited access before authentication, such as access to a DHCP server or a VoIP VLAN, administrators must configure one of the following:
Guest VLAN:
Voice VLAN:
“By default, interfaces under 802.1X block all traffic until authentication completes. To allow limited pre-authentication services (e.g., DHCP), guest VLAN or voice VLAN must be configured.”
This is a frequent certification trap question, especially when analyzing why a client cannot even obtain an IP address during testing.
A supplicant is the client-side component (usually a laptop, desktop, or IoT device) that initiates the 802.1X authentication process.
Modern OS (e.g., Windows, macOS):
Often include built-in 802.1X supplicants.
May retry authentication automatically if credentials fail or network conditions change.
Manual Configuration May Be Required:
Especially in enterprise networks requiring:
Specific EAP methods (e.g., EAP-TLS, PEAP)
Trusted CA certificates
User or machine credentials
“Some operating systems support auto-retry, while others may need manual configuration of the supplicant settings (e.g., EAP method, credentials, CA trust).”
This insight is valuable both in real deployments and on exams, where troubleshooting failed authentication scenarios is a common topic.
If a device fails to authenticate due to:
Incorrect credentials
Expired certificates
Unsupported supplicant configuration
Then:
The switchport is not granted network access.
No traffic is allowed, and the device remains isolated.
This is the default 802.1X behavior unless explicit fallback mechanisms are configured.
Guest VLAN: Allows limited internet-only access.
Restricted VLAN: Internal quarantine or remediation network.
MAC Authentication Bypass: For non-802.1X-capable devices.
“If the client fails authentication and no guest VLAN or fallback VLAN is defined, the port remains unauthorized and blocks all traffic.”
This is critical when diagnosing why a printer or user workstation cannot communicate with the network despite physically connecting to a switch.
| Topic | Clarification |
|---|---|
| 802.1X Blocking Behavior | All traffic blocked until authentication is complete |
| Pre-Authentication Access | Requires guest VLAN or voice VLAN configuration |
| Supplicant Behavior | May vary by OS; some require manual EAP and certificate setup |
| Authentication Failure | Without fallback, port remains unauthorized and fully blocks access |
What is the purpose of IEEE 802.1X authentication in Ethernet networks?
It provides port-based network access control by authenticating devices before allowing network access.
IEEE 802.1X controls access to the network using three components:
Supplicant
The client device requesting network access.
Authenticator
The network device (switch) controlling the port.
Authentication Server
Typically a RADIUS server that validates credentials.
When a device connects:
The port starts in an unauthorized state.
The supplicant sends authentication credentials.
The switch forwards them to the RADIUS server.
If authentication succeeds, the port becomes authorized.
This prevents unauthorized devices from accessing the network.
Demand Score: 72
Exam Relevance Score: 80
What problem does MAC Authentication Bypass (MAB) solve?
It allows devices without 802.1X capability to authenticate using their MAC address.
Some devices cannot run 802.1X clients, including:
IP phones
printers
IoT devices
MAB allows the switch to authenticate such devices by sending their MAC address to the RADIUS server.
The RADIUS server then decides whether to allow access based on configured policies.
Although convenient, MAB is less secure than 802.1X because MAC addresses can be spoofed.
Demand Score: 65
Exam Relevance Score: 76
Why is RADIUS commonly used with 802.1X?
Because it provides centralized authentication, authorization, and accounting services.
RADIUS allows network administrators to manage authentication policies from a central server.
Benefits include:
centralized credential verification
detailed logging and accounting
integration with identity management systems
When a device attempts authentication, the switch forwards credentials to the RADIUS server, which determines whether access is granted.
Demand Score: 60
Exam Relevance Score: 74