Chapter 7
| Authentication Commands
802.1X Port Authentication
– 204 –
Example
Console(config)#interface eth 1/2
Console(config-if)#dot1x max-req 2
Console(config-if)#
dot1x
operation-mode
This command allows hosts (clients) to connect to an 802.1X-authorized port. Use
the
no
form with no keywords to restore the default to single host. Use the
no
form
with the
multi-host max-count
keywords to restore the default maximum count.
Syntax
dot1x operation-mode
{
single-host
|
multi-host
[
max-count
count
] |
mac-based-auth
}
no dot1x operation-mode
[
multi-host max-count
]
single-host
– Allows only a single host to connect to this port.
multi-host
– Allows multiple host to connect to this port.
max-count
– Keyword for the maximum number of hosts.
count
– The maximum number of hosts that can connect to a port.
(Range: 1-1024; Default: 5)
mac-based
– Allows multiple hosts to connect to this port, with each host
needing to be authenticated.
Default
Single-host
Command Mode
Interface Configuration
Command Usage
◆
The “max-count” parameter specified by this command is only effective if the
dot1x mode is set to “auto” by the
dot1x port-control
command.
◆
In “multi-host” mode, only one host connected to a port needs to pass
authentication for all other hosts to be granted network access. Similarly, a port
can become unauthorized for all hosts if one attached host fails re-
authentication or sends an EAPOL logoff message.
◆
In “mac-based-auth” mode, each host connected to a port needs to pass
authentication. The number of hosts allowed access to a port operating in this
mode is limited only by the available space in the secure address table (i.e., up
to 1024 addresses).
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...