11.07.2015 Views

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>sdot1x auth-fail vlanYou cannot configure a VLAN to be both a restricted VLAN <strong>and</strong> a voice VLAN. If you do this, a syslogmessage is generated.When a restricted VLAN port is moved to an unauthorized state, the authentication process restarts. Ifthe supplicant fails the authentication process again, the authenticator waits in the held state. After thesupplicant has correctly re-authenticated, all IEEE 802.1x ports are reinitialized <strong>and</strong> treated as normalIEEE 802.1x ports.When you reconfigure a restricted VLAN as a different VLAN, any ports in the restricted VLAN are alsomoved, <strong>and</strong> the ports stay in their currently authorized state.When you shut down or remove a restricted VLAN from the VLAN database, any ports in the restrictedVLAN are immediately moved to an unauthorized state, <strong>and</strong> the authentication process restarts. Theauthenticator does not wait in a held state because the restricted VLAN configuration still exists. Whilethe restricted VLAN is inactive, all authentication attempts are counted so that when the restrictedVLAN becomes active, the port is immediately placed in the restricted VLAN.The restricted VLAN is supported only in single host mode (the default port mode). For this reason,when a port is placed in a restricted VLAN, the supplicant’s MAC address is added to the MAC addresstable, <strong>and</strong> any other MAC address that appears on the port is treated as a security violation.Examples This example shows how to configure a restricted VLAN on port 1:<strong>Switch</strong># configure terminalEnter configuration comm<strong>and</strong>s, one per line. End with CNTL/Z.<strong>Switch</strong>(config)# interface gigabitethernet1/0/1<strong>Switch</strong>(config-if)# dot1x auth-fail vlan 40<strong>Switch</strong>(config-if)# end<strong>Switch</strong>(config)# end<strong>Switch</strong>#You can verify your configuration by entering the show dot1x [interface interface-id] privileged EXECcomm<strong>and</strong>.Related Comm<strong>and</strong>s Comm<strong>and</strong> Descriptiondot1x auth-fail max-attempts[max-attempts]show dot1x [interface interface-id]Configures the number of authentication attempts allowedbefore assigning a supplicant to the restricted VLAN.Displays IEEE 802.1x status for the specified port.OL-9776-08<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> Comm<strong>and</strong> Reference2-151

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!