User Authentication Commands
25-26
25
Example
The following example enables port security for port 5, and sets the response to a
security violation to issue a trap message:
Related Commands
shutdown (27-7)
mac-address-table static (31-1)
802.1X Port Authentication
The switch supports IEEE 802.1X (dot1x) port-based access control that prevents
unauthorized access to the network by requiring users to first submit credentials for
authentication. Client authentication is controlled centrally by a RADIUS server
using EAP (Extensible Authentication Protocol).
Console(config)#interface ethernet 1/5
Console(config-if)#port security action trap
Table 25-13 802.1X Port Authentication Commands
Command
Function
Mode
Page
dot1x system-auth-control
Enables dot1x globally on the switch.
GC
25-27
dot1x default
Resets all dot1x parameters to their default values
GC
25-27
dot1x max-req
Sets the maximum number of times that the switch
retransmits an EAP request/identity packet to the client
before it times out the authentication session
IC
25-27
dot1x port-control
Sets dot1x mode for a port interface
IC
25-28
dot1x operation-mode
Allows single or multiple hosts on an dot1x port
IC
25-29
dot1x re-authenticate
Forces re-authentication on specific ports
PE
25-30
dot1x re-authentication
Enables re-authentication for all ports
IC
25-30
dot1x timeout quiet-period
Sets the time that a switch port waits after the Max
Request Count has been exceeded before attempting to
acquire a new client
IC
25-31
dot1x timeout re-authperiod
Sets the time period after which a connected client must
be re-authenticated
IC
25-31
dot1x timeout tx-period
Sets the time period during an authentication session that
the switch waits before re-transmitting an EAP packet
IC
25-32
show dot1x
Shows all dot1x related information
PE
25-32
Summary of Contents for 8926EM
Page 6: ...ii ...
Page 34: ...Getting Started ...
Page 44: ...Introduction 1 10 1 ...
Page 62: ...Initial Configuration 2 18 2 ...
Page 64: ...Switch Management ...
Page 76: ...Configuring the Switch 3 12 3 ...
Page 118: ...Basic Management Tasks 4 42 4 ...
Page 164: ...User Authentication 6 28 6 ...
Page 176: ...Access Control Lists 7 12 7 ...
Page 284: ...Quality of Service 14 8 14 ...
Page 294: ...Multicast Filtering 15 10 15 ...
Page 300: ...Domain Name Service 16 6 16 ...
Page 310: ...Dynamic Host Configuration Protocol 17 10 17 ...
Page 320: ...Configuring Router Redundancy 18 10 18 ...
Page 344: ...IP Routing 19 24 19 ...
Page 356: ...Unicast Routing 20 12 20 Web Click Routing Protocol RIP Statistics Figure 20 5 RIP Statistics ...
Page 386: ...Unicast Routing 20 42 20 ...
Page 388: ...Command Line Interface ...
Page 400: ...Overview of the Command Line Interface 21 12 21 ...
Page 466: ...SNMP Commands 24 16 24 ...
Page 520: ...Access Control List Commands 26 18 26 ...
Page 546: ...Rate Limit Commands 30 2 30 ...
Page 612: ...VLAN Commands 34 24 34 ...
Page 626: ...Class of Service Commands 35 14 35 ...
Page 670: ...DHCP Commands 39 16 39 ...
Page 716: ...IP Interface Commands 41 36 41 ...
Page 768: ...IP Routing Commands 42 52 42 ...
Page 770: ...Appendices ...
Page 791: ......