aaa authentication dot1x
To specify the authentication, authorization, and accounting (AAA) method to use on ports complying with
the IEEE 802.1x authentication, use the aaa authentication dot1x command in global configuration mode
on the switch stack or on a standalone switch. To disable authentication, use the no form of this command.
aaa authentication dot1x {default} method1
no aaa authentication dot1x {default} method1
Syntax Description
The default method when a user logs in. Use the listed authentication method that
follows this argument.
default
Specifies the server authentication. Enter the group radius keywords to use the list of
all RADIUS servers for authentication.
Though other keywords are visible in the command-line help strings, only the
default and group radius keywords are supported.
Note
method1
Command Default
No authentication is performed.
Command Modes
Global configuration
Command History
ModificationRelease
This command was introduced.Cisco IOS XE 3.3SECisco IOS XE 3.3SE
Usage Guidelines
The method argument identifies the method that the authentication algorithm tries in the specified sequence
to validate the password provided by the client. The only method that is IEEE 802.1x-compliant is the group
radius method, in which the client data is validated against a RADIUS authentication server.
If you specify group radius, you must configure the RADIUS server by entering the radius-server host
global configuration command.
Use the show running-config privileged EXEC command to display the configured lists of authentication
methods.
Examples
This example shows how to enable AAA and how to create an IEEE 802.1x-compliant authentication list.
This authentication first tries to contact a RADIUS server. If this action returns an error, the user is not allowed
access to the network.
Device(config)# aaa new-model
Device(config)# aaa authentication dot1x default group radius
Command Reference, Cisco IOS XE Everest 16.5.1a (Catalyst 3650 Switches)
711
aaa authentication dot1x