1-63
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
Beginning in privileged EXEC mode, follow these steps to configure the maximum number of allowed
authentication attempts. This procedure is optional.
To return to the default value, use the no authentication event retry interface configuration command.
This example shows how to set 2 as the number of authentication attempts allowed before the port moves
to the restricted VLAN:
Switch(config-if)# authentication event retry 2
Configuring Inaccessible Authentication Bypass and Critical Voice VLAN
You can configure the inaccessible bypass feature, also referred to as critical authentication or the AAA
fail policy to allow data traffic to pass through on the native VLAN when the server is not available. You
can also configure the critical voice VLAN feature so that if the server is not available and traffic from
the host is tagged with the voice VLAN, the connected device (the phone) is put in the configured voice
VLAN for the port.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
interface interface-id Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the “802.1x Authentication
Configuration Guidelines” section on page 1-39.
Step 3
switchport mode access
or
switchport mode private-vlan host
Set the port to access mode,
or
Configure the Layer 2 port as a private-VLAN host port.
Step 4
authentication port-control auto Enable 802.1x authentication on the port.
Step 5
authentication event fail action
authorize vlan-id
Specify an active VLAN as an 802.1x restricted VLAN. The range is 1 to
4094.
You can configure any active VLAN except an internal VLAN (routed
port), an RSPAN VLAN, a primary private VLAN, or a voice VLAN as
an 802.1x restricted VLAN.
Step 6
authentication event retry retry count Specify a number of authentication attempts to allow before a port moves
to the restricted VLAN. The range is 1 to 3, and the default is 3.
Step 7
end Return to privileged EXEC mode.
Step 8
show authentication interface
interface-id
(Optional) Verify your entries.
Step 9
copy running-config startup-config (Optional) Save your entries in the configuration file.