EasyManuals Logo

Cisco Catalyst 4500 Series Administration Guide

Cisco Catalyst 4500 Series
1814 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1215 background imageLoading...
Page #1215 background image
46-77
Software Configuration Guide—Release IOS XE 3.6.0E and IOS 15.2(2)E
OL_28731-01
Chapter 46 Configuring 802.1X Port-Based Authentication
Configuring 802.1X Port-Based Authentication
Switch# clear errdisable interface interface-id vlan [vlan-list]
Switch(config)# interface
interface-id
Switch(config-if)# shutdown
Switch(config-if)# end
Switch# show errdisable detect
Switch# copy running-config startup-config
This example shows how to configure the switch to shut down any VLAN on which a security violation
error occurs:
Switch(config)# errdisable detect cause security-violation shutdown vlan
This example shows how to re-enable all VLANs that were error disabled on port Gi4/0/2:
Switch# clear errdisable interface GigabitEthernet4/0/2 vlan
You can verify your settings by entering the show errdisable detect privileged EXEC command.
Configuring 802.1X with VLAN Assignment
For enabling dynamic VLAN assignment, no additional configuration is required in the switch. For
information on configuring Multiple- authentication (MDA), refer to the “Configuring Multiple Domain
Authentication and Multiple Authorization” section on page 46-36. To enable VLAN assignment, you
must configure the Cisco ACS server.
To enable 802.1X with VLAN assignment, perform this task:
Command Purpose
Step 1
Switch# configure terminal
Enters global configuration mode.
Step 2
Switch(config)# interface
interface-id
Enters interface configuration mode.
Step 3
Switch(config-if)# switchport
access vlan-id
Sets the VLAN for a switched interface in access mode.
Step 4
Switch(config-if)# switchport mode
access
Specifies a nontrunking, nontagged single VLAN Layer 2 interface.
Step 5
Switch(config-if)# switchport voice
vlan vlan-id
Sets the voice VLAN for the interface.
Step 6
Switch(config-if)# authentication
host-mode multi-domain
Enables MDA on the interface.
Step 7
Switch(config-if)# authentication
port-control auto
Enables 802.1X authentication on the interface.
Step 8
Switch(config-if)# dot1x pae
authenticator
Enables 802.1X authentication on the port with default parameters.
Refer to the “Default 802.1X Configuration” section on page 46-30.
Step 9
Switch(config)# end
Returns to privileged EXEC mode.
Step 10
Switch# show dot1x interface
interface-id details
(Optional) Verifies your entries.
Step 11
Switch# copy running-config
startup-config
(Optional) Saves your entries in the configuration file.

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4500 Series and is the answer not in the manual?

Cisco Catalyst 4500 Series Specifications

General IconGeneral
SeriesCatalyst 4500 Series
CategorySwitch
Layer SupportLayer 2, Layer 3
Form FactorModular chassis
StackableNo
Chassis Slots3, 6, 7, 10
Power Supply OptionsAC, DC
RedundancyPower supply, Supervisor engine
Network ManagementCisco IOS Software CLI, SNMP, Cisco Prime Infrastructure
FeaturesSecurity, QoS
Port DensityUp to 384 ports per chassis
Security Features802.1X, ACLs, DHCP Snooping, Dynamic ARP Inspection, IP Source Guard
Supervisor Engine8-E

Related product manuals