![Cisco Catalyst Blade 3032 Software Configuration Manual Download Page 281](http://html.mh-extra.com/html/cisco/catalyst-blade-3032/catalyst-blade-3032_software-configuration-manual_67665281.webp)
9-33
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-06
Chapter 9 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
This example shows how the session ID appears in the output of the show authentication command. The
session ID in this example is 160000050000000B288508E5:
Switch#
show authentication sessions
Interface MAC Address Method Domain Status Session ID
Fa4/0/4 0000.0000.0203 mab DATA Authz Success 160000050000000B288508E5
This is an example of how the session ID appears in the syslog output. The session ID in this example
is also160000050000000B288508E5:
1w0d: %AUTHMGR-5-START: Starting 'mab' for client (0000.0000.0203) on Interface Fa4/0/4
AuditSessionID 160000050000000B288508E5
1w0d: %MAB-5-SUCCESS: Authentication successful for client (0000.0000.0203) on Interface
Fa4/0/4 AuditSessionID 160000050000000B288508E5
1w0d: %AUTHMGR-7-RESULT: Authentication result 'success' from 'mab' for client
(0000.0000.0203) on Interface Fa4/0/4 AuditSessionID 160000050000000B288508E5
The session ID is used by the NAD, the AAA server, and other report-analyzing applications to identify
the client. The ID appears automatically. No configuration is required.
Configuring 802.1x Authentication
These sections contain this configuration information:
•
Default 802.1x Authentication Configuration, page 9-34
•
802.1x Authentication Configuration Guidelines, page 9-35
•
Configuring 802.1x Authentication, page 9-38
(required)
•
Configuring 802.1x Readiness Check, page 9-40
•
Configuring 802.1x Violation Modes, page 9-38
•
Configuring Voice Aware 802.1x Security, page 9-41
•
Configuring the Switch-to-RADIUS-Server Communication, page 9-42
(required)
•
Configuring the Host Mode, page 9-44
(optional)
•
Configuring Periodic Re-Authentication, page 9-45
(optional)
•
Manually Re-Authenticating a Client Connected to a Port, page 9-46
(optional)
•
Changing the Quiet Period, page 9-46
(optional)
•
Changing the Switch-to-Client Retransmission Time, page 9-46
(optional)
•
Setting the Switch-to-Client Frame-Retransmission Number, page 9-47
(optional)
•
Setting the Re-Authentication Number, page 9-48
(optional)
•
Enabling MAC Move, page 9-48
(optional)
•
Enabling MAC Replace, page 9-49
(optional)
•
Configuring 802.1x Accounting, page 9-50
(optional)
•
Configuring a Guest VLAN, page 9-51
(optional)
•
Configuring a Restricted VLAN, page 9-52
(optional)
•
Configuring the Inaccessible Authentication Bypass Feature, page 9-53
(optional)
•
Configuring 802.1x Authentication with WoL, page 9-57
(optional)
•
Configuring MAC Authentication Bypass, page 9-57
(optional)