
Chapter 8
| Authentication Commands
802.1X Port Authentication
– 260 –
dot1x operation-
mode
This command allows hosts (clients) to connect to an 802.1X-authorized port. Use
the
no
form with no keywords to restore the default to single host. Use the
no
form
with the
multi-host max-count
keywords to restore the default maximum count.
Syntax
dot1x operation-mode
{
single-host
|
multi-host
[
max-count
count
] |
mac-based-auth
}
no dot1x operation-mode
[
multi-host max-count
]
single-host
– Allows only a single host to connect to this port.
multi-host
– Allows multiple host to connect to this port.
max-count
– Keyword for the maximum number of hosts.
count
– The maximum number of hosts that can connect to a port.
(Range: 1-1024; Default: 5)
mac-based
– Allows multiple hosts to connect to this port, with each host
needing to be authenticated.
Default
Single-host
Command Mode
Interface Configuration
Command Usage
◆
The “max-count” parameter specified by this command is only effective if the
dot1x mode is set to “auto” by the
command.
◆
In “multi-host” mode, only one host connected to a port needs to pass
authentication for all other hosts to be granted network access. Similarly, a port
can become unauthorized for all hosts if one attached host fails re-
authentication or sends an EAPOL logoff message.
◆
In “mac-based-auth” mode, each host connected to a port needs to pass
authentication. The number of hosts allowed access to a port operating in this
mode is limited only by the available space in the secure address table (i.e., up
to 1024 addresses).
Example
Console(config)#interface eth 1/2
Console(config-if)#dot1x operation-mode multi-host max-count 10
Console(config-if)#
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...