![Cisco Catalyst Blade 3032 Software Configuration Manual Download Page 303](http://html.mh-extra.com/html/cisco/catalyst-blade-3032/catalyst-blade-3032_software-configuration-manual_67665303.webp)
9-55
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-06
Chapter 9 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
To return to the RADIUS server default settings, use the
no radius-server dead-criteria
, the
no
radius-server deadtime
, and the
no radius-server host
global configuration commands. To return to
the default settings of inaccessible authentication bypass, use the
no authentication event server dead
action
{
authorize
|
reinitialize
} global configuration command. To disable inaccessible authentication
bypass, use the
no authentication event server dead action
interface configuration command.
This example shows how to configure the inaccessible authentication bypass feature:
Switch(config)#
radius-server dead-criteria time 30 tries 20
Switch(config)#
radius-server deadtime 60
Switch(config)#
radius-server host 1.1.1.2 acct-port 1550 auth-port 1560 test username
user1 idle-time 30 key abc1234
Switch(config)#
dot1x critical eapol
Switch(config)#
dot1x critical recovery delay 2000
Switch(config)#
interface gigabitethernet 1/0/1
Switch(config)#
radius-server deadtime 60
Switch(config-if)#
dot1x critical
Switch(config-if)#
dot1x critical recovery action reinitialize
Switch(config-if)#
dot1x critical vlan 20
Switch(config-if)#
end
Step 6
interface
interface-id
Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the
“802.1x Authentication
Configuration Guidelines” section on page 9-35
.
Step 7
authentication event server dead
action [authorize | reinitialize] vlan
vlan-id
Use these keywords to move hosts on the port if the RADIUS server is
unreachable:
•
authorize
–Move any new hosts trying to authenticate to the
user-specified critical VLAN.
•
reinitialize
–Move all authorized hosts on the port to the
user-specified critical VLAN.
Step 8
authentication event server dead
action
{
authorize
|
reinitialize
}
vlan
vlan-id
]
Enable the inaccessible authentication bypass feature, and use these
keywords to configure the feature:
•
authorize
—Authorize the port.
•
reinitialize
—Reinitialize all authorized clients.
Step 9
end
Return to privileged EXEC mode.
Step 10
show authentication interface
interface-id
(Optional) Verify your entries.
Step 11
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Command
Purpose