Skip to content

The Cisco switch must uniquely identify and authenticate all network-connected endpoint devices before establishing any connection.

An XCCDF Rule

Description

Controlling LAN access via 802.1x authentication can assist in preventing a malicious user from connecting an unauthorized PC to a switch port to inject or receive data from the network without detection.

ID
SV-220649r863283_rule
Version
CISC-L2-000020
Severity
High
References
Updated

Remediation Templates

A Manual Procedure

Configure 802.1 x authentications on all host-facing access switch ports. To authenticate those devices that do not support 802.1x, MAC Authentication Bypass must be configured.

Step 1: Configure the radius servers as shown in the example below:

SW1(config)#radius server RADIUS_1
SW1(config-radius-server)#address ipv4 10.1.22.3