![Cisco Catalyst Blade 3032 Скачать руководство пользователя страница 288](http://html.mh-extra.com/html/cisco/catalyst-blade-3032/catalyst-blade-3032_software-configuration-manual_67665288.webp)
9-40
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-06
Chapter 9 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
Configuring 802.1x Readiness Check
The 802.1x readiness check monitors 802.1x activity on all the switch ports and displays information
about the devices connected to the ports that support 802.1x. You can use this feature to determine if the
devices connected to the switch ports are 802.1x-capable.
The 802.1x readiness check is allowed on all ports that can be configured for 802.1x. The readiness
check is not available on a port that is configured as
dot1x force-unauthorized
.
Follow these guidelines to enable the readiness check on the switch:
•
The readiness check is typically used before 802.1x is enabled on the switch.
•
If you use the
dot1x test eapol-capable
privileged EXEC command without specifying an interface,
all the ports on the switch stack are tested.
•
When you configure the
dot1x test eapol-capable
command on an 802.1x-enabled port, and the link
comes up, the port queries the connected client about its 802.1x capability. When the client responds
with a notification packet, it is 802.1x-capable. A syslog message is generated if the client responds
within the timeout period. If the client does not respond to the query, the client is not
802.1x-capable. No syslog message is generated.
•
The readiness check can be sent on a port that handles multiple hosts (for example, a PC that is
connected to an IP phone). A syslog message is generated for each of the clients that respond to the
readiness check within the timer period.
Beginning in privileged EXEC mode, follow these steps to enable the 802.1x readiness check on the
switch:
Step 10
authentication port-control auto
Enable 802.1x authentication on the port.
For feature interaction information, see the
“802.1x Authentication
Configuration Guidelines” section on page 9-35
.
Step 11
dot1x pae authenticator
Set the interface Port Access Entity to act only as an authenticator and
ignore messages meant for a supplicant.
Step 12
end
Return to privileged EXEC mode.
Step 13
show authentication
Verify your entries.
Step 14
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Command
Purpose
Command
Purpose
Step 1
dot1x test eapol-capable
[
interface
interface-id
]
Enable the 802.1x readiness check on the switch.
(Optional) For
interface-id
specify the port on which to check for
IEEE 802.1x readiness.
Note
If you omit the optional
interface
keyword, all interfaces on the
switch are tested.
Step 1
configure terminal
(Optional) Enter global configuration mode.
Step 2
dot1x test timeout
timeout
(Optional) Configure the timeout used to wait for EAPOL response. The
range is from 1 to 65535 seconds. The default is 10 seconds.
Содержание Catalyst Blade 3032
Страница 46: ...Contents xlvi Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide OL 13270 06 ...
Страница 50: ...lii Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide OL 13270 06 Preface ...
Страница 1380: ...Index IN 54 Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide OL 12189 06 ...