Disabling 802.1X Authentication on the Cisco NX-OS Device
You can disable 802.1X authentication on the Cisco NX-OS device. By default, the Cisco NX-OS software
enables 802.1X authentication after you enable the 802.1X feature. However, when you disable the 802.1X
feature, the configuration is removed from the Cisco NX-OS device. The Cisco NX-OS software allows you
to disable 802.1X authentication without losing the 802.1X configuration.
When you disable 802.1X authentication, the port mode for all interfaces defaults to force-authorized regardless
of the configured port mode. When you reenable 802.1X authentication, the Cisco NX-OS software restores
the configured port mode on the interfaces.
Note
Before you begin
Enable the 802.1X feature on the Cisco NX-OS device.
SUMMARY STEPS
1.
configure terminal
2.
no dot1x system-auth-control
3.
exit
4.
(Optional)
show dot1x
5.
(Optional)
copy running-config startup-config
DETAILED STEPS
Purpose
Command or Action
Enters global configuration mode.
configure terminal
Example:
Step 1
switch# configure terminal
switch(config)#
Disables 802.1X authentication on the Cisco NX-OS device.
The default is enabled.
no dot1x system-auth-control
Example:
Step 2
Use the
dot1x system-auth-control
command
to enable 802.1X authentication on the Cisco
NX-OS device.
Note
switch(config)# no dot1x system-auth-control
Exits configuration mode.
exit
Example:
Step 3
switch(config)# exit
switch#
Displays the 802.1X feature status.
(Optional)
show dot1x
Example:
Step 4
switch# show dot1x
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
198
Configuring 802.1X
Disabling 802.1X Authentication on the Cisco NX-OS Device