EasyManua.ls Logo

Cisco Catalyst 2960-X - Configuring 802.1 X Inaccessible Authentication Bypass with Critical Voice VLAN

Cisco Catalyst 2960-X
498 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
PurposeCommand or Action
Returns to privileged EXEC mode.end
Example:
Switch(config-if)# end
Step 7
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice
VLAN
Beginning in privileged EXEC mode, follow these steps to configure critical voice VLAN on a port and enable
the inaccessible authentication bypass feature.
SUMMARY STEPS
1.
configure terminal
2.
aaa new-model
3.
radius-server dead-criteria{time seconds } [tries number]
4.
radius-serverdeadtimeminutes
5.
radius-server host ip-address address[acct-port udp-port][auth-port udp-port] [testusername
name[idle-time time] [ignore-acct-port][ignore auth-port]] [key string]
6.
dot1x critical {eapol | recovery delay milliseconds}
7.
interface interface-id
8.
authentication event server dead action {authorize | reinitialize} vlan vlan-id]
9.
switchport voice vlan vlan-id
10.
authentication event server dead action authorize voice
11.
show authentication interface interface-id
12.
copy running-config startup-config
DETAILED STEPS
PurposeCommand or Action
Enters the global configuration mode.configure terminal
Example:
Switch# configure terminal
Step 1
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
328 OL-29048-01
Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN

Table of Contents

Other manuals for Cisco Catalyst 2960-X

Related product manuals