9-63
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
Chapter 9 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
This example shows how to configure a port attempt 802.1x authentication first, followed by web
authentication as fallback method:
Switch#
configure terminal
Switch(config)#
interface gigabitethernet 1/0/1
Switch(config)#
authentication order dot1x webauth
Configuring Open1x
Beginning in privileged EXEC mode:
This example shows how to configure open 1x on a port:
Switch#
configure terminal
Switch(config)#
interface gigabitethernet 1/0/1
Switch(config)#
authentication control-direction both
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
interface
interface-id
Specify the port to be configured, and enter interface
configuration mode.
Step 3
authentication order dot1x | mab
{
webauth
}
(Optional) Set the order of authentication methods used on a port.
Step 4
authentication priority dot1x
|
mab
{
webauth
}
(Optional) Add an authentication method to the port-priority list.
Step 5
show authentication
(Optional) Verify your entries.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
interface
interface-id
Specify the port to be configured, and enter interface
configuration mode.
Step 3
authentication control-direction {both
|
in
}
(Optional) Configure the port control as unidirectional or
bidirectional.
Step 4
authentication fallback
name
(Optional) Configure a port to use web authentication as a
fallback method for clients that do not support 802.1x
authentication.
Step 5
authentication host-mode
[
multi-auth
|
multi-domain
|
multi-host
|
single-host
]
(Optional) Set the authorization manager mode on a port.
Step 6
authentication open
(Optional) Enable or disable open access on a port.
Step 7
authentication order dot1x | mab
{
webauth
}
(Optional) Set the order of authentication methods used on a port.
Step 8
authentication periodic
(Optional) Enable or disable reauthentication on a port.
Step 9
authentication port-control
{
auto
|
force-authorized
| f
orce-un authorized
}
(Optional) Enable manual control of the port authorization state.
Step 10
show authentication
(Optional) Verify your entries.
Step 11
copy running-config startup-config
(Optional) Save your entries in the configuration file.