Purpose
Command or Action
Configures critical voice VLAN to move data traffic on the port to the
voice VLAN if the RADIUS server is unreachable.
authentication event server dead action
authorize voice
Example:
Switch(config-if)#
authentication
Step 10
event server dead action
authorize voice
(Optional) Verify your entries.
show authentication interface interface-id
Example:
Switch(config-if)#
do show
Step 11
authentication interface gigabit 1/0/1
(Optional) Verify your entries.
copy running-config startup-config
Example:
Switch(config-if)#
do copy
Step 12
running-config startup-config
To return to the RADIUS server default settings, use the
no radius-server dead-criteria
, the
no radius-server
deadtime
, and the
no radius-server host
global configuration commands. To disable inaccessible authentication
bypass, use the
no authentication event server dead action
interface configuration command. To disable
critical voice VLAN, use the no
authentication event server dead action authorize voice
interface
configuration command.
Example of Configuring Inaccessible Authentication Bypass
This example shows how to configure the inaccessible authentication bypass feature:
Switch(config)#
radius-server dead-criteria time 30 tries 20
Switch(config)#
radius-server deadtime 60
Switch(config)#
radius-server host 1.1.1.2 acct-port 1550 auth-port 1560 test username user1
idle-time 30 key abc1234
Switch(config)#
dot1x critical eapol
Switch(config)#
dot1x critical recovery delay 2000
Switch(config)#
interface gigabitethernet 1/0/1
Switch(config-if)#
dot1x critical
Switch(config-if)#
dot1x critical recovery action reinitialize
Switch(config-if)#
dot1x critical vlan 20
Switch(config-if)#
end
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
331
Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN