12-44
Cisco IE 3000 Switch Software Configuration Guide
OL-13018-03
Chapter 12 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
You can configure the maximum number of authentication attempts allowed before a user is assigned to
the restricted VLAN by using the dot1x auth-fail max-attempts interface configuration command. The
range of allowable authentication attempts is 1 to 3. The default is 3 attempts.
Beginning in privileged EXEC mode, follow these steps to configure the maximum number of allowed
authentication attempts. This procedure is optional.
To return to the default value, use the no dot1x auth-fail max-attempts interface configuration
command.
This example shows how to set 2 as the number of authentication attempts allowed before the port moves
to the restricted VLAN:
Switch(config-if)# dot1x auth-fail max-attempts 2
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
interface interface-id Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the
“802.1x Authentication
Configuration Guidelines” section on page 12-28.
Step 3
switchport mode access Set the port to access mode.
Step 4
authentication port-control auto
or
dot1x port-control auto
Enable 802.1x authentication on the port.
Step 5
dot1x auth-fail vlan vlan-id Specify an active VLAN as an 802.1x restricted VLAN. The range is 1
to
4094.
You can configure any active VLAN except an RSPAN VLAN or a voice
VLAN as an 802.1x restricted VLAN.
Step 6
dot1x auth-fail max-attempts max
attempts
Specify a number of authentication attempts to allow before a port moves
to the restricted VLAN. The range is 1 to 3, and the default is 3.
Step 7
end Return to privileged EXEC mode.
Step 8
show authentication interface-id
or
show dot1x interface interface-id
(Optional) Verify your entries.
Step 9
copy running-config startup-config (Optional) Save your entries in the configuration file.