Chapter 8
Configuring IEEE 802.1x Port-Based Authentication
Command
Step 4
dot1x mac-auth-bypass [eap | timeout
activity {value}]
Step 5
end
Step 6
show dot1x interface interface-id
Step 7
copy running-config startup-config
To disable MAC authentication bypass, use the no dot1x mac-auth-bypass interface configuration
command.
This example shows how to enable MAC authentication bypass:
Switch(config-if)# dot1x mac-auth-bypass
Configuring NAC Layer 2 IEEE 802.1x Validation
In Cisco IOS Release 12.244)SE or later, you can configure NAC Layer 2 IEEE 802.1x validation, which
is also referred to as IEEE 802.1x authentication with a RADIUS server.
Beginning in privileged EXEC mode, follow these steps to configure NAC Layer 2 IEEE 802.1x
validation. The procedure is optional.
Command
Step 1
configure terminal
Step 2
interface interface-id
Step 3
dot1x guest-vlan vlan-id
Step 4
dot1x reauthentication
OL-8915-03
Purpose
Enable MAC authentication bypass.
(Optional) Use the eap keyword to configure the switch to use EAP for
authorization.
(Optional) Use the timeout activity keywords to configured the number
of seconds that a connected host can be inactive before it is placed in an
unauthorized state. The range is 1 to 65535.
You must enable port security before configuring a time out value. For
more information, see the
page
23-9.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Purpose
Enter global configuration mode.
Specify the port to be configured, and enter interface configuration mode.
Specify an active VLAN as an IEEE 802.1x guest VLAN. The range is 1
to 4094.
You can configure any active VLAN except an internal VLAN (routed
port), an RSPAN VLAN, or a voice VLAN as an IEEE 802.1x guest
VLAN.
Enable periodic re-authentication of the client, which is disabled by
default.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Configuring IEEE 802.1x Authentication
"Configuring Port Security" section on
8-39