11.07.2015 Views

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

authentication eventChapter 2<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>sFor authentication-fail events:• If the supplicant fails authentication, the port is moved to a restricted VLAN, <strong>and</strong> an EAP successmessage is sent to the supplicant because it i s not notified of the actual authentication failure.– If the EAP success message is not sent, the supplicant tries to authenticate every 60 seconds (thedefault) by sending an EAP-start message.– Some hosts (for example, devices running Windows XP) cannot implement DHCP until theyreceive an EAP success message.The restricted VLAN is supported only in single host mode (the default port mode). When a port isplaced in a restricted VLAN, the supplicant's MAC address is added to the MAC address table. Anyother MAC address on the port is treated as a security violation.• You cannot configure an internal VLANs for Layer 3 ports as a restricted VLAN. You cannot specifythe same VLAN as a restricted VLAN <strong>and</strong> as a voice VLAN.Enable re-authentication with restricted VLANs. If re-authentication is disabled, the ports in therestricted VLANs do not receive re-authentication requests if it is disabled.To start the re-authentication process, the restricted VLAN must receive a link-down event or anExtensible Authentication Protocol (EAP) logoff event from the port. If a host is connected througha hub:– The port might not receive a link-down event when the host is disconnected.– The port might not detect new hosts until the next re-authentication attempt occurs.When you reconfigure a restricted VLAN as a different type of VLAN, ports in the restricted VLANare also moved <strong>and</strong> stay in their currently authorized state.ExamplesThis example shows how to configure the authentication event fail comm<strong>and</strong>:<strong>Switch</strong>(config-if)# authentication event fail action authorize vlan 20This example shows how to configure a no-response action:<strong>Switch</strong>(config-if)# authentication event no-response action authorize vlan 10This example shows how to configure a server-response action:<strong>Switch</strong>(config-if)# authentication event server alive action reinitializeThis example shows how to configure a port to send both new <strong>and</strong> existing hosts to the critical VLANwhen the RADIUS server is unavailable. Use this comm<strong>and</strong> for ports in multiple authentication (multiauth)mode or if the voice domain of the port is in MDA mode:<strong>Switch</strong>(config-if)# authentication event server dead action authorize vlan 10This example shows how to configure a port to send both new <strong>and</strong> existing hosts to the critical VLANwhen the RADIUS server is unavailable. Use this comm<strong>and</strong> for ports in multiple-host or multiauthmode:<strong>Switch</strong>(config-if)# authentication event server dead action reinitialize vlan 10You can verify your settings by entering the show authentication privileged EXEC comm<strong>and</strong>.2-28<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> Comm<strong>and</strong> ReferenceOL-9776-08

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!