228
Configuring IEEE 802.1x Port-Based Authentication
How to Configure IEEE 802.1x Port-Based Authentication
4.
radius-server host
ip-address
[acct-port
udp-port
] [
auth-port
udp-port
] [
test
username
name
[
idle-time
time
]
[
ignore-acct-port
]
[
ignore-auth-port
]] [
key
string
]
(Optional) Configures the RADIUS server parameters by using these keywords:
acct-port
udp-port—
Specifies the UDP port for the RADIUS accounting server.
The range for the UDP port number is from 0 to 65536. The default is 1646.
auth-port
udp-port—
Specifies the UDP port for the RADIUS authentication
server. The range for the UDP port number is from 0 to 65536. The default is
1645.
Note:
You should configure the UDP port for the RADIUS accounting server and the
UDP port for the RADIUS authentication server to nondefault values.
test
username
name
—Enables automated testing of the RADIUS server status,
and specifies the username to be used.
idle-time
time—
Sets the interval of time in minutes after which the switch sends
test packets to the server. The range is from 1 to 35791 minutes. The default is
60 minutes (1 hour).
ignore-acct-port
—
Disables testing on the RADIUS-server accounting port.
ignore-auth-port
—
Disables testing on the RADIUS-server authentication port.
key
string—
Specifies the authentication and encryption key for all RADIUS
communication between the switch and the RADIUS daemon.
Note:
Always configure the key as the last item in the
radius-server host
command
syntax because leading spaces are ignored, but spaces within and at the end of the
key are used. If you use spaces in the key, do not enclose the key in quotation marks
unless the quotation marks are part of the key. This key must match the encryption
used on the RADIUS daemon.
You can also configure the authentication and encryption key by using the
radius-server key
{
0
string
|
7
string
|
string
} global configuration command.
5.
dot1x critical
{
eapol
|
recovery delay
milliseconds
}
(Optional) Configures the parameters for inaccessible authentication bypass.
eapol
—Specifies that the switch sends an EAPOL-Success message when the
switch successfully authenticates the critical port.
recovery delay
milliseconds
—Sets the recovery delay period during which the
switch waits to reinitialize a critical port when a RADIUS server that was
unavailable becomes available. The range is from 1 to 10000 milliseconds. The
default is 1000 milliseconds (a port can be reinitialized every second).
6.
interface
interface-id
Specifies the port to be configured, and enter interface configuration mode.
7.
authentication event server
dead action [authorize |
reinitialize] vlan
vlan-id
Use these keywords to move hosts on the port if the RADIUS server is unreachable:
authorize—Moves any new hosts trying to authenticate to the user-specified
critical VLAN.
reinitialize
—Moves all authorized hosts on the port to the user-specified critical
VLAN.
8.
authentication event server
dead action
{
authorize
|
reinitialize
}
vlan
vlan-id
]
Enables the inaccessible authentication bypass feature and uses these keywords to
configure the feature:
authorize
—Authorizes the port.
reinitialize
—Reinitializes all authorized clients.
Command
Purpose
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...