EasyManuals Logo

Cisco Catalyst 4500 Series Software Configuration Guide

Cisco Catalyst 4500 Series
2086 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1294 background imageLoading...
Page #1294 background image
49-14
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 49 Configuring 802.1X Port-Based Authentication
About 802.1X Port-Based Authentication
Fallback to web-based authentication is not supported on EtherChannels or EtherChannel members.
Although fallback to web-based authentication is an interface-specific configuration, the web-based authentication
fallback behavior is defined in a global fallback profile. If the global fallback configuration changes, the new profile is not
used until the next instance of authentication fallback.
For detailed information on configuring web-based authentication, see Chapter 52, “Configuring Web-Based Authentication.
Using 802.1X with Inaccessible Authentication Bypass
When a switch cannot reach the configured RADIUS servers and clients (supplicants) cannot be authenticated, you can
configure a switch to allow network access to hosts connected to critical ports that are enabled for Inaccessible Authentication
Bypass.
When Inaccessible Authentication Bypass is enabled, a switch monitors the status of the configured RADIUS servers. If no
RADIUS servers are available, clients that fail authentication due to server unavailability are authorized. Inaccessible
Authentication Bypass can be enabled for data clients and voice clients. For data clients, you can specify an Inaccessible
Authentication Bypass VLAN on a per-port basis. For voice clients they are authorized in the configured voice vlan.
Inaccessible Authentication Bypass for voice clients can activate in Multiple Domain Authentication and Multiple
Authentication modes, in which authentication is enforced for voice devices.
Note Inaccessible Authentication Bypass allows a voice client to access configured voice VLAN when
RADIUS becomes unavailable. For the voice device to operate properly, it must learn the voice VLAN
ID through other protocols such as CDP, LLDP, or DHCP, wherever appropriate. When a RADIUS server
is unavailable, it may not be possible for a switch to recognize a MAC address as that of a voice device.
Therefore, when Inaccessible Authentication Bypass is configured for voice devices, it should also be
configured for data. Voice devices may be authorized on both critical data and voice VLANs. If port
security is enabled, this may affect the maximum port security entries enforced on the port.
By default, data clients that were already authorized when RADIUS becomes unavailable are unaffected by Inaccessible
Authentication Bypass. To reauthenticate all authorized data clients on the port when RADIUS becomes unavailable, use the
authentication server dead action reinitialize vlan interface configuration command. This command is intended for
multiauthentication mode and is mutually exclusive with the authentication server dead action authorize vlan command.
Note In multiauthentication mode, you cannot use the authentication server dead action authorize vlan
command to enable Inaccessible Authentication Bypass for data clients; it has no effect. Instead, use the
authentication server dead action reinitialize vlan vlan-id command.
When RADIUS becomes available, critically authorized ports can be configured to automatically reauthenticate themselves.
Note To properly detect RADIUS server availability, the test username name option should be enabled in the
radius-server host command. For details on how to configure RADIUS server, see the “Configuring
Switch-to-RADIUS-Server Communication” section on page 49-32.
Inaccessible Authentication Bypass cannot activate after a port falls back to Web-based authentication. For details on how to
configure Web-based authentication, see Chapter 52, “Configuring Web-Based Authentication.
For details on how to configure Inaccessible Authentication Bypass, see Chapter 52, “Configuring Web-Based Authentication”.

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4500 Series and is the answer not in the manual?

Cisco Catalyst 4500 Series Specifications

General IconGeneral
SeriesCatalyst 4500 Series
CategorySwitch
Layer SupportLayer 2, Layer 3
Form FactorModular chassis
StackableNo
Chassis Slots3, 6, 7, 10
Power Supply OptionsAC, DC
RedundancyPower supply, Supervisor engine
Network ManagementCisco IOS Software CLI, SNMP, Cisco Prime Infrastructure
FeaturesSecurity, QoS
Port DensityUp to 384 ports per chassis
Security Features802.1X, ACLs, DHCP Snooping, Dynamic ARP Inspection, IP Source Guard
Supervisor Engine8-E

Related product manuals