Purpose
Command or Action
Returns to privileged EXEC mode.
end
Example:
Switch(config-if)#
end
Step 7
Configuring the Inaccessible Authentication Bypass Feature
You can configure the inaccessible bypass feature, also referred to as critical authentication or the AAA fail
policy.
Beginning in privileged EXEC mode, follow these steps to configure the port as a critical port and enable the
inaccessible authentication bypass feature. This procedure is optional.
SUMMARY STEPS
1.
configure terminal
2.
radius-server dead-criteria time time tries tries
3.
radius-server deadtime minutes
4.
radius-server host ip-address
[
acct-port udp-port
] [
auth-port udp-port
][
test username name
[
idle-time
time
] [
ignore-acct-port
] [
ignore-auth-port
]] [
key string
]
5.
dot1x critical
{
eapol
|
recovery delay milliseconds
}
6.
interface interface-id
7.
authentication event server dead action
{
authorize
|
reinitialize
}
vlan vlan-id
]
8.
dot1x critical
[
recovery action reinitialize
|
vlan vlan-id
]
9.
end
DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
(Optional) Sets the conditions that are used to decide when a RADIUS server
is considered unavailable or
dead
.
radius-server dead-criteria time time
tries tries
Step 2
Example:
Switch(config)#
radius-server
The range for
time
is from 1 to 120 seconds. The switch dynamically determines
the default
seconds
value that is 10 to 60 seconds.
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
274
OL-29434-01
Configuring IEEE 802.1x Port-Based Authentication
Configuring the Inaccessible Authentication Bypass Feature