Chapter 55: 802.1x Port-based Network Access Control Commands
772
Section VIII: Port Security
DOT1X PORT-CONTROL FORCE-AUTHORIZED
Syntax
dot1x port-control force-authorized
Parameters
None.
Mode
Port Interface mode
Description
Use this command to configure ports to the 802.1x authenticator role, in
the force-authorized state. Ports that are set to the force-authorized state
transition to the authorized state without any authentication exchanges
required. The ports transmit and receive traffic normally without 802.1X-
based authentication of the clients. For background information, refer to
“Operational Settings for Authenticator Ports” on page 726.
Confirmation Command
“SHOW AUTH-MAC INTERFACE” on page 781 or “SHOW DOT1X
INTERFACE” on page 786
Example
This example sets ports 1 and 4 to the authenticator role, in the force-
authorized state:
awplus> enable
awplus# configure terminal
awplus(config)# interface port1.0.1,port1.0.4
awplus(config-if)# dot1x port-control force-authorized
Summary of Contents for AT-9000/28
Page 4: ......
Page 26: ...Contents 26...
Page 30: ...Tables 30...
Page 36: ...36 Section I Getting Started...
Page 70: ...Chapter 2 Starting a Management Session 70 Section I Getting Started...
Page 96: ...96 Section II Basic Operations...
Page 142: ...Chapter 6 Basic Switch Management Commands 142 Section II Basic Operations...
Page 220: ...Chapter 9 IPv4 and IPv6 Management Addresses 220 Section II Basic Operations...
Page 244: ...Chapter 10 IPv4 and IPv6 Management Address Commands 244 Section II Basic Operations...
Page 264: ...Chapter 12 SNTP Client Commands 264 Section II Basic Operations...
Page 298: ...Chapter 15 Enhanced Stacking 298 Section II Basic Operations...
Page 312: ...Chapter 16 Enhanced Stacking Commands 312 Section II Basic Operations...
Page 318: ...Chapter 17 Port Mirror 318 Section II Basic Operations...
Page 324: ...Chapter 18 Port Mirror Commands 324 Section II Basic Operations Example awplus show mirror...
Page 350: ...Chapter 21 Multicast Commands 350 Section II Basic Operations...
Page 352: ...352 Section III File System...
Page 360: ...Chapter 22 File System 360 Section III File System...
Page 383: ...AT 9000 Switch Command Line User s Guide Section III File System 383 Example awplus show boot...
Page 386: ...Chapter 25 Boot Configuration File Commands 386 Section III File System...
Page 398: ...Chapter 26 File Transfers 398 Section III File System...
Page 406: ...Chapter 27 File Transfer Commands 406 Section III File System...
Page 408: ...408 Section IV Event Messages...
Page 430: ...Chapter 30 Syslog Client 430 Section IV Event Messages...
Page 438: ...438 Section V Port Trunks...
Page 448: ...Chapter 32 Static Port Trunks 448 Section V Port Trunks...
Page 480: ...480 Section VI Spanning Tree Protocols...
Page 520: ...Chapter 38 STP Commands 520 Section VI Spanning Tree Protocols...
Page 558: ...558 Section VII Virtual LANs...
Page 600: ...Chapter 42 Port based and Tagged VLAN Commands 600 Section VII Virtual LANs...
Page 634: ...Chapter 44 GARP VLAN Registration Protocol Commands 634 Section VII Virtual LANs...
Page 670: ...Chapter 47 Private Port VLANs 670 Section VII Virtual LANs...
Page 692: ...Chapter 50 VLAN Stacking 692 Section VII Virtual LANs...
Page 698: ...Chapter 51 VLAN Stacking Commands 698 Section VII Virtual LANs...
Page 700: ...700 Section VIII Port Security...
Page 748: ...Chapter 54 802 1x Port based Network Access Control 748 Section VIII Port Security...
Page 790: ...Chapter 55 802 1x Port based Network Access Control Commands 790 Section VIII Port Security...
Page 792: ...792 Section IX Simple Network Management Protocols...
Page 804: ...Chapter 56 SNMPv1 and SNMPv2c 804 Section X Simple Network Management Protocols...
Page 852: ...852 Section X Network Management...
Page 976: ...Chapter 63 Address Resolution Protocol ARP 976 Section X Network Management...
Page 1090: ...1090 Section XI Management Security...
Page 1114: ...Chapter 71 Telnet Server 1114 Section XI Management Security...
Page 1122: ...Chapter 73 Telnet Client 1122 Section XI Management Security...
Page 1126: ...Chapter 74 Telnet Client Commands 1126 Section XI Management Security...
Page 1138: ...Chapter 75 Secure Shell SSH Server 1138 Section XI Management Security...
Page 1158: ...Chapter 78 Non secure HTTP Web Browser Server Commands 1158 Section XI Management Security...
Page 1186: ...Chapter 80 Secure HTTPS Web Browser Server Commands 1186 Section XI Management Security...
Page 1202: ...Chapter 81 RADIUS and TACACS Clients 1202 Section XI Management Security...
Page 1230: ...Chapter 82 RADIUS and TACACS Client Commands 1230 Section XI Management Security...