11.07.2015 Views

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

dot1xChapter 2<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>sdot1xUse the dot1x global configuration comm<strong>and</strong> on the switch stack or on a st<strong>and</strong>alone switch to globallyenable IEEE 802.1x authentication. Use the no form of this comm<strong>and</strong> to return to the default setting.dot1x {guest-vlan supplicant} | {system-auth-control}no dot1x {guest-vlan supplicant} | {system-auth-control}NoteThough visible in the comm<strong>and</strong>-line help strings, the credentials name keywords are not supported.Syntax Descriptionguest-vlan supplicantsystem-auth-controlEnable optional guest VLAN behavior globally on the switch.Enable IEEE 802.1x authentication globally on the switch.DefaultsIEEE 802.1x authentication is disabled, <strong>and</strong> the optional guest VLAN behavior is disabled.Comm<strong>and</strong> ModesGlobal configurationComm<strong>and</strong> HistoryRelease12.2(35)SE2ModificationThis comm<strong>and</strong> was introduced.Usage GuidelinesYou must enable authentication, authorization, <strong>and</strong> accounting (AAA) <strong>and</strong> specify the authenticationmethod list before globally enabling IEEE 802.1x authentication. A method list describes the sequence<strong>and</strong> authentication methods to be used to authenticate a user.Before globally enabling IEEE 802.1x authentication on a switch, remove the EtherChannelconfiguration from the interfaces on which IEEE 802.1x authentication <strong>and</strong> EtherChannel areconfigured.If you are using a device running the <strong>Cisco</strong> Access Control Server (ACS) application for IEEE 802.1xauthentication with EAP-Transparent LAN Services (TLS) <strong>and</strong> with EAP-MD5, make sure that thedevice is running ACS Version 3.2.1 or later.You can use the guest-vlan supplicant keywords to enable the optional IEEE 802.1x guest VLANbehavior globally on the switch. For more information, see the dot1x guest-vlan comm<strong>and</strong>.2-146<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> Comm<strong>and</strong> ReferenceOL-9776-08

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!