EasyManuals Logo

Cisco Catalyst 4500 Series Command Reference Guide

Cisco Catalyst 4500 Series
1230 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #94 background imageLoading...
Page #94 background image
2-36
Catalyst 4500 Series Switch Cisco IOS Command Reference—Release IOS XE 3.4.0SG and IOS 15.1(2)SG)
OL-27596 -01
Chapter 2 Cisco IOS Commands for the Catalyst 4500 Series Switches
authentication port-control
authentication port-control
To configure the port-control value, use the authentication port-control command in interface
configuration mode. To return to the default setting, use the no form of this command.
authentication port-control [auto | force-authorized | force-unauthorized]
no authentication port-control
Syntax Description
Command Default force-authorized
Command Modes Interface configuration mode
Command History
Usage Guidelines The authentication port-control command replaces the following dot1x command, which is deprecated
in Cisco IOS Release 12.2(50)SG and later releases:
[no] dot1x port-control [auto | force-authorized | force-unauthorized]
The following guidelines apply to Ethernet switch network modules:
• The 802.1X protocol is supported on Layer 2 static-access ports.
• You can use the auto keyword only if the port is not configured as one of the following types:
–
Trunk port—If you try to enable 802.1X on a trunk port, an error message appears, and 802.1X
is not enabled. If you try to change the mode of an 802.1X-enabled port to trunk, the port mode
is not changed.
–
EtherChannel port—Before enabling 802.1X on the port, you must first remove it from the
EtherChannel. If you try to enable 802.1X on an EtherChannel or on an active port in an
EtherChannel, an error message appears, and 802.1X is not enabled. If you enable 802.1X on a
not-yet active port of an EtherChannel, the port does not join the EtherChannel.
auto (Optional) Enables 802.1X port-based authentication and causes the port to
begin in the unauthorized state.
force-authorized (Optional) Disables 802.1X on the interface and causes the port to change
to the authorized state without any authentication exchange required. The
port transmits and receives normal traffic without 802.1X-based
authentication of the client. The force-authorized keyword is the default.
force-unauthorized (Optional) Denies all access through this interface by forcing the port to
change to the unauthorized state, ignoring all attempts by the client to
authenticate.
Release Modification
12.2(50)SG Support for this command was introduced.

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4500 Series and is the answer not in the manual?

Cisco Catalyst 4500 Series Specifications

General IconGeneral
SeriesCatalyst 4500 Series
CategorySwitch
Layer SupportLayer 2, Layer 3
Form FactorModular chassis
StackableNo
Chassis Slots3, 6, 7, 10
Power Supply OptionsAC, DC
RedundancyPower supply, Supervisor engine
Network ManagementCisco IOS Software CLI, SNMP, Cisco Prime Infrastructure
FeaturesSecurity, QoS
Port DensityUp to 384 ports per chassis
Security Features802.1X, ACLs, DHCP Snooping, Dynamic ARP Inspection, IP Source Guard
Supervisor Engine8-E

Related product manuals