hit counter script

Configuring The Inaccessible Authentication Bypass Feature - Cisco IE-3000-8TC Software Configuration Manual

Software configuration guide
Hide thumbs Also See for IE-3000-8TC:
Table of Contents

Advertisement

Chapter 12
Configuring IEEE 802.1x Port-Based Authentication

Configuring the Inaccessible Authentication Bypass Feature

You can configure the inaccessible bypass feature, also referred to as critical authentication or the AAA
fail policy.
Note
You must configure the RADIUS server parameters on the switch to monitor the RADIUS server state
(see the
must also configure the idle time, dead time, and dead criteria.
If you do not configure these parameters, the switch prematurely changes the RADIUS server status to
dead.
Beginning in privileged EXEC mode, follow these steps to configure the port as a critical port and enable
the inaccessible authentication bypass feature. This procedure is optional.
Command
Step 1
configure terminal
Step 2
radius-server dead-criteria time time
tries tries
Step 3
radius-server deadtime minutes
OL-13018-03
"Configuring the Switch-to-RADIUS-Server Communication" section on page
Purpose
Enter global configuration mode.
(Optional) Set the conditions that are used to decide when a RADIUS
server is considered unavailable or dead.
The range for time is from 1 to 120 seconds. The switch dynamically
determines the default seconds value that is 10 to 60 seconds.
The range for tries is from 1 to 100. The switch dynamically determines
the default tries parameter that is 10 to 100.
(Optional) Set the number of minutes that a RADIUS server is not sent
requests. The range is from 0 to 1440 minutes (24 hours). The default is
0 minutes.
Configuring 802.1x Authentication
Cisco IE 3000 Switch Software Configuration Guide
12-34). You
12-45

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ie 3000

Table of Contents