The Guest VLAN 802.1X extension addresses this limitation with regard to non-802.1X capable devices and the Authentication-fail VLAN
802.1X extension addresses this limitation with regard to external users.
•
If the supplicant fails authentication a specified number of times, the authenticator places the port in the Authentication-fail VLAN.
•
If a port is already forwarding on the Guest VLAN when 802.1X is enabled, the port is moved out of the Guest VLAN and the
authentication process begins.
Configuring a Guest VLAN
If the supplicant does not respond within a determined amount of time ([reauth-max + 1] * tx-period, the system assumes that the host
does not have 802.1X capability and the port is placed in the Guest VLAN.
NOTE:
For more information about configuring timeouts, refer to
.
Configure a port to be placed in the Guest VLAN after failing to respond within the timeout period using the
dot1x guest-vlan
command from INTERFACE mode. View your configuration using the
show config
command from INTERFACE mode or using the
show
dot1x interface
command from EXEC Privilege mode.
Example of Viewing Guest VLAN Configuration
Dell(conf-if-gi-2/1)#dot1x guest-vlan 200
Dell(conf-if-gi 2/1))#show config
!
interface GigabitEthernet 2/1
switchport
dot1x guest-vlan 200
no shutdown
Dell(conf-if-gi 2/1))#
Configuring an Authentication-Fail VLAN
If the supplicant fails authentication, the authenticator re-attempts to authenticate after a specified amount of time.
NOTE:
For more information about authenticator re-attempts, refer to
Configuring a Quiet Period after a Failed
.
You can configure the maximum number of times the authenticator re-attempts authentication after a failure (
3
by default), after which the
port is placed in the Authentication-fail VLAN.
Configure a port to be placed in the VLAN after failing the authentication process as specified number of times using the
dot1x auth-
fail-vlan
command from INTERFACE mode. Configure the maximum number of authentication attempts by the authenticator using
the keyword
max-attempts
with this command.
Example of Configuring Maximum Authentication Attempts
Dell(conf-if-gi-2/1)#dot1x guest-vlan 200
Dell(conf-if-gi 2/1)#show config
!
interface GigabitEthernet 2/1
switchport
dot1x authentication
dot1x guest-vlan 200
no shutdown
Dell(conf-if-gi-2/1)#
Dell(conf-if-gi-2/1)#dot1x auth-fail-vlan 100 max-attempts 5
Dell(conf-if-gi-2/1)#show config
!
interface GigabitEthernet 2/1
switchport
dot1x authentication
802.1X
99
Summary of Contents for S3048-ON
Page 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Page 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Page 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Page 241: ...Dell Control Plane Policing CoPP 241 ...
Page 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Page 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Page 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Page 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Page 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Page 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Page 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Page 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...