Configuring Port-Based Access Control (802.1x)Configuring Switch Ports To Operate As Supplicants for 802.1x Connections to Other SwitchesConfiguring a Supplicant Switch Port. Note that you must enable supplicant operation on a port before you can change the supplicant configuration.This means you must execute the supplicant command once without any otherparameters, then execute it again with a supplicant parameter you want toconfigure. If the intended authenticator port uses RADIUS authentication,then use the identity and secret options to configure the RADIUS-expectedusername and password on the supplicant port. If the intended authenticatorport uses Local 802.1x authentication, then use the identity and secret optionsto configure the authenticator switch’s local username and password on thesupplicant port.Syntax: aaa port-access supplicant [ethernet] < port-list >To enable supplicant operation on the designated ports,execute this command without any other parameters.After doing this, you can use the command again withthe following parameters to configure supplicant opertion. (Use one instance of the command for eachparameter you want to configure The no form disablessupplicant operation on the designated port(s).[identity < username >]Sets the username and password to pass to the authenticator port when a challenge-request packet is receivedfrom the authenticator port in response to an authentication request. If the intended authenticator port isconfigured for RADIUS authentication, then < user-name > and < password > must be the username andpassword expected by the RADIUS server. If theintended authenticator port is configured for Localauthentication, then < username > and < password >must be the username and password configured on theAuthenticator switch. (Defaults: Null)[secret]Enter secret: < password >Repeat secret: < password >Sets the secret password to be used by the port supplicant when an MD5 authentication request is receivedfrom an authenticator. The switch prompts you to enterthe secret password after the command is invoked.8-35