1-68
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
This example shows that when all the VLANs are cleared from a VLAN group, the VLAN group is
cleared:
switch(config)# no vlan group eng-dept vlan-list 30
Vlan 30 is successfully cleared from vlan group eng-dept.
switch(config)# show vlan group group-name eng-dept
This example shows how to clear all the VLAN groups:
switch(config)# no vlan group end-dept vlan-list all
switch(config)# show vlan-group all
For more information about these commands, see the Cisco IOS Security Command Reference.
Configuring NAC Layer 2 802.1x Validation
You can configure NAC Layer 2 802.1x validation, which is also referred to as 802.1x authentication
with a RADIUS server.
Beginning in privileged EXEC mode, follow these steps to configure NAC Layer 2 802.1x validation.
The procedure is optional.
This example shows how to configure NAC Layer 2 802.1x validation:
Switch# configure terminal
Switch(config)# interface gigabitethernet2/0/1
Switch(config-if)# authentication periodic
Switch(config-if)# authentication timer reauthenticate
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
interface interface-id Specify the port to be configured, and enter interface configuration mode.
Step 3
authentication event no-response
action authorize vlan vlan-id
Specify an active VLAN as an 802.1x guest VLAN. The range is 1 to
4094.
You can configure any active VLAN except an internal VLAN (routed
port), an RSPAN VLAN, or a voice VLAN as an 802.1x guest VLAN.
Step 4
authentication periodic Enable periodic re-authentication of the client, which is disabled by
default.
Step 5
authentication timer reauthenticate Set re-authentication attempt for the client (set to one hour).
This command affects the behavior of the switch only if periodic
re-authentication is enabled.
Step 6
end Return to privileged EXEC mode.
Step 7
show authentication interface
interface-id
Verify your 802.1x authentication configuration.
Step 8
copy running-config startup-config (Optional) Save your entries in the configuration file.