498 Configuring Port and System Security
10
View 802.1X information about Port 8.
console#show dot1x interface te1/0/8
Administrative Mode............... Enabled
Dynamic VLAN Creation Mode........ Enabled
Monitor Mode...................... Disabled
Port     Admin               Oper  Reauth Reauth
         Mode                Mode Control Period
-------  ---------------- ------------  --------  ----------
Te1/0/8  mac-based Authorized FALSE     3600
Quiet Period................................... 60
Transmit Period................................ 30
Maximum Requests............................... 2
Max Users...................................... 2
VLAN Assigned.................................. 1 (Default)
Supplicant Timeout............................. 30
Guest-vlan Timeout............................. 90
Server Timeout (secs).......................... 30
MAB mode (configured).......................... Disabled
MAB mode (operational)......................... Disabled
Controlling Authentication-Based VLAN Assignment
The network in this example uses three VLANs to control access to network 
resources. When a client connects to the network, it is assigned to a particular 
VLAN based on one of the following events:
• It attempts to contact the 802.1X server and is authenticated.
• It attempts to contact the 802.1X server and fails to authenticate.
• It does not attempt to contact the 802.1X server.
The following table describes the three VLANs:
VLAN ID VLAN Name VLAN Purpose
100 Authorized Data from authorized clients
200 Unauthorized Data traffic from clients that fail the authentication 
with the RADIUS server
300 Guest Data traffic from clients that do not attempt to 
authenticate with the RADIUS server