C
ONFIGURING
THE
S
WITCH
3-92
Configuring Port Settings for 802.1X
When 802.1X is enabled, you need to configure the parameters for the
authentication process that runs between the client and the switch (i.e.,
authenticator), as well as the client identity lookup process that runs
between the switch and authentication server. These parameters are
described in this section.
Command Attributes
•
Port
– Port number.
•
Status
– Indicates if authentication is enabled or disabled on the port.
(Default: Disabled)
•
Operation Mode
– Allows single or multiple hosts (clients) to connect
to an 802.1X-authorized port. (Options: Single-Host, Multi-Host;
Default: Single-Host)
•
Max Count
– The maximum number of hosts that can connect to a
port when the Multi-Host operation mode is selected. (Range: 1-1024;
Default: 5)
•
Mode
– Sets the authentication mode to one of the following options:
-
Auto
– Requires a dot1x-aware client to be authorized by the
authentication server. Clients that are not dot1x-aware will be denied
access.
-
Force-Authorized
– Forces the port to grant access to all clients,
either dot1x-aware or otherwise.
-
Force-Unauthorized
– Forces the port to deny access to all clients,
either dot1x-aware or otherwise.
•
Re-authen
– Sets the client to be re-authenticated after the interval
specified by the Re-authentication Period. Re-authentication can be
used to detect if a new device is plugged into a switch port. (Default:
Disabled)
Summary of Contents for 6128L2
Page 2: ......
Page 21: ...CONTENTS xvii Glossary Index ...
Page 22: ...CONTENTS xviii ...
Page 26: ...TABLES xxii ...
Page 40: ...INTRODUCTION 1 10 ...
Page 54: ...INITIAL CONFIGURATION 2 14 ...
Page 193: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Page 257: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Page 313: ...COMMAND GROUPS 4 13 PE Privileged Exec VC VLAN Database Configuration ...
Page 592: ...TROUBLESHOOTING B 4 ...
Page 605: ......