EasyManuals Logo

Cisco Catalyst 3560-X User Manual

Cisco Catalyst 3560-X
1538 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #314 background imageLoading...
Page #314 background image
1-26
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
This example shows how to configure the inaccessible authentication bypass feature and configure the
critical voice VLAN:
Switch(config)# radius-server dead-criteria time 30 tries 20
Switch(config)# radius-server deadtime 60
Step 4
radius-server host ip-ad-
dress [acct-port udp-port]
[auth-port udp-port] [test
username name [idle-time
time] [ignore-acct-port] [ig-
nore-auth-port]] [key
string]
Configures the RADIUS server parameters:
acct-port udp-port—Specifies the UDP port for the RADIUS accounting server.
The range for the UDP port number is from 0 to 65536. The default is 1646.
auth-port udp-port—Specifies the UDP port for the RADIUS authentication
server. The range for the UDP port number is from 0 to 65536. The default is
1645.
Note You should configure the UDP port for the RADIUS accounting server and
the UDP port for the RADIUS authentication server to nondefault values.
test username name—Enables automatic testing of the RADIUS server status,
and specifies the username to be used.
idle-time time—Sets the interval of time in minutes after which the switch sends
test packets to the server. The range is from 1 to 35791 minutes. The default is
60 minutes (1 hour).
ignore-acct-portDisables testing on the RADIUS-server accounting port.
ignore-auth-portDisables testing on the RADIUS-server authentication port.
For key string, specify the authentication and encryption key used between the
switch and the RADIUS daemon running on the RADIUS server.
Note Always configure the key as the last item in the radius-server host
command syntax because leading spaces are ignored, but spaces within and
at the end of the key are used. If you use spaces in the key, do not enclose the
key in quotation marks unless the quotation marks are part of the key. This
key must match the encryption used on the RADIUS daemon.
You can also configure the authentication and encryption key by using the radi-
us-server key {0 string | 7 string | string} global configuration command.
Step 5
interface interface-id Specifies the port to be configured and enters interface configuration mode.
Step 6
authentication event server
dead action {authorize |
reinitialize} vlan vlan-id
Configures a critical VLAN to move hosts on the port if the RADIUS server is un-
reachable:
authorize—Moves any new hosts trying to authenticate to the user-specified
critical VLAN.
reinitialize—Moves all authorized hosts on the port to the user-specified critical
VLAN.
Step 7
switchport voice vlan
vlan-id
Specifies the voice VLAN for the port. The voice VLAN cannot be the same as the
critical data VLAN configured in Step 6.
Step 8
authentication event server
dead action authorize voice
Configures critical voice VLAN to move data traffic on the port to the voice VLAN
if the RADIUS server is unreachable.
Step 9
end Returns to privileged EXEC mode.
Step 10
show authentication
interface interface-id
(Optional) Verifies your entries.
Command Purpose

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3560-X and is the answer not in the manual?

Cisco Catalyst 3560-X Specifications

General IconGeneral
Enclosure TypeRack-mountable - 1U
SubtypeGigabit Ethernet
Ports48 x 10/100/1000 + 4 x SFP
Flash Memory64 MB
Power DeviceInternal power supply
Voltage RequiredAC 120/230 V (50/60 Hz)
Operating SystemCisco IOS
Device TypeSwitch
PerformanceSwitching capacity: 128 Gbps
Jumbo Frame SupportYes
Routing ProtocolRIP-1, RIP-2, EIGRP
Remote Management ProtocolSNMP 1, RMON 1, RMON 2, RMON 3, RMON 9, Telnet, SNMP 3, HTTP, HTTPS
FeaturesDHCP support, VLAN support, QoS, IPv6 support, Syslog
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3z, IEEE 802.1D, IEEE 802.1Q, IEEE 802.3ab, IEEE 802.1p, IEEE 802.3af, IEEE 802.3x, IEEE 802.3ad, IEEE 802.1w, IEEE 802.1x, IEEE 802.1s, IEEE 802.3ah, IEEE 802.1ag, IEEE 802.3at
StackingStackable
Security FeaturesSSH, RADIUS, TACACS+
ManagementCLI
Dimensions (H x W x D)17.5 in
Operating Temperature32 to 113 °F (0 to 45 °C)
Humidity10 - 95% (non-condensing)

Related product manuals