Purpose
Command or Action
Returns to privileged EXEC mode.
end
Example:
Switch(config-if)#
end
Step 7
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice
VLAN
Beginning in privileged EXEC mode, follow these steps to configure critical voice VLAN on a port and enable
the inaccessible authentication bypass feature.
SUMMARY STEPS
1.
configure terminal
2.
aaa new-model
3.
radius-server dead-criteria
{
time seconds
} [
tries number
]
4.
radius-serverdeadtimeminutes
5.
radius-server host ip-address address
[
acct-port udp-port
][
auth-port udp-port
] [
testusername
name
[
idle-time time
] [
ignore-acct-port
][
ignore auth-port
]] [
key string
]
6.
dot1x critical
{
eapol
|
recovery delay milliseconds
}
7.
interface interface-id
8.
authentication event server dead action
{
authorize
|
reinitialize
}
vlan vlan-id
]
9.
switchport voice vlan vlan-id
10.
authentication event server dead action authorize voice
11.
show authentication interface interface-id
12.
copy running-config startup-config
DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
328
OL-29048-01
Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN