802.1x Supplicant and Authenticator Switches with Network Edge Access Topology
How to Configure 802.1x Port-Based Authentication
Default 802.1x Authentication Configuration
802.1x Authentication Configuration Guidelines
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Maximum Number of Allowed Devices Per Port
Configuring 802.1x Readiness Check
Configuring Voice Aware 802.1x Security
Configuring 802.1x Violation Modes
Configuring 802.1x Authentication
Configuring 802.1x Port-Based Authentication
Configuring the Switch-to-RADIUS-Server Communication
Configuring Periodic Re-Authentication
Changing the Switch-to-Client Retransmission Time
Setting the Switch-to-Client Frame-Retransmission Number
Setting the Re-Authentication Number
Configuring Number of Authentication Attempts on a Restricted VLAN
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN
Example of Configuring Inaccessible Authentication Bypass
Configuring 802.1x Authentication with WoL
Configuring MAC Authentication Bypass
Formatting a MAC Authentication Bypass Username and Password
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
xiv
OL-29048-01
Contents