11.07.2015 Views

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

Catalyst 3750-E and 3560-E Switch Cisco IOS ... - DNIP . NET

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

authentication violationChapter 2<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> <strong>Cisco</strong> <strong>IOS</strong> Comm<strong>and</strong>sauthentication violationUse the authentication violation interface configuration comm<strong>and</strong> to configure the violation modes thatoccur when a new device connects to a port or when a new device connects to a port after the maximumnumber of devices are connected to that port.authentication violation {protect | replace | restrict | shutdown}no authentication violation {protect | replace | restrict | shutdown}Syntax DescriptionprotectreplacerestrictshutdownUnexpected incoming MAC addresses are dropped. No syslog errors aregenerated.Removes the current session <strong>and</strong> initiates authentication with the new host.Generates a syslog error when a violation error occurs.Error disables the port or the virtual port on which an unexpected MACaddress occurs.DefaultsBy default authentication violation shutdown mode is enabled.Comm<strong>and</strong> ModesInterface configurationComm<strong>and</strong> HistoryRelease12.2(50)SE12.2(55)SEModificationThis comm<strong>and</strong> was introduced.The replace keyword was added.ExamplesThis example shows how to configure an IEEE 802.1x-enabled port as error disabled <strong>and</strong> to shut downwhen a new device connects it:<strong>Switch</strong>(config-if)# authentication violation shutdownThis example shows how to configure an IEEE 802.1x-enabled port to generate a system error message<strong>and</strong> to change the port to restricted mode when a new device connects to it:<strong>Switch</strong>(config-if)# authentication violation restrictThis example shows how to configure an IEEE 802.1x-enabled port to ignore a new device when itconnects to the port:<strong>Switch</strong>(config-if)# authentication violation protectThis example shows how to configure an IEEE 802.1x-enabled port to remove the current session <strong>and</strong>initiate authentication with a new device when it connects to the port:<strong>Switch</strong>(config-if)# authentication violation replaceYou can verify your settings by entering the show authentication privileged EXEC comm<strong>and</strong>.2-48<strong>Catalyst</strong> <strong>3750</strong>-E <strong>and</strong> <strong>3560</strong>-E <strong>Switch</strong> Comm<strong>and</strong> ReferenceOL-9776-08

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!