Previous Topic

Next Topic

Book Contents

Port-Based Network Access Control Commands

This section describes the commands you use to configure port-based network access control (IEEE 802.1X). Port-based network access control allows you to permit access to network services only to and devices that are authorized and authenticated.

aaa authentication dot1x default

Use this command to configure the authentication method for port-based access to the switch. The additional methods of authentication are used only if the previous method returns an error, not if there is an authentication failure. The possible methods are as follows:

clear dot1x statistics

This command resets the 802.1X statistics for the specified port or for all ports.

clear dot1x authentication-history

This command clears the authentication history table captured during successful and unsuccessful authentication on all interface or the specified interface.

clear radius statistics

This command is used to clear all RADIUS statistics.

dot1x dynamic-vlan enable

Use this command to enable the switch to create VLANs dynamically when a RADIUS-assigned VLAN does not exist in the switch.

no dot1x dynamic-vlan enable

Use this command to prevent the switch from creating VLANs when a RADIUS-assigned VLAN does not exist in the switch.

dot1x guest-vlan

This command configures VLAN as guest vlan on an interface or a range of interfaces. The command specifies an active VLAN as an IEEE 802.1X guest VLAN. The range is 1 to the maximum VLAN ID supported by the platform.

no dot1x guest-vlan

This command disables Guest VLAN on the interface.

dot1x initialize

This command begins the initialization sequence on the specified port. This command is only valid if the control mode for the specified port is auto or mac-based. If the control mode is not auto or mac-based, an error will be returned.

dot1x max-req

This command sets the maximum number of times the authenticator state machine on an interface or range of interfaces will transmit an EAPOL EAP Request/Identity frame before timing out the supplicant. The <count> value must be in the range 1 - 10.

no dot1x max-req

This command sets the authenticator state machine on the port to the default value.

dot1x max-users

Use this command to set the maximum number of clients supported on an interface or range of interfaces when MAC-based dot1x authentication is enabled on the port. The maximum users supported per port is dependent on the product. The <count> value is in the range <1 - 16>

no dot1x max-users

This command resets the maximum number of clients allowed per port to its default value.

dot1x port-control

This command sets the authentication mode to use on the specified interface or range of interfaces. Use the force-authorized parameter to specify that the authenticator PAE unconditionally sets the controlled port to unauthorized. Use the force-authorized parameter to specify that the authenticator PAE unconditionally sets the controlled port to authorized. Use the auto parameter to specify that the authenticator PAE sets the controlled port mode to reflect the outcome of the authentication exchanges between the supplicant, authenticator and the authentication server. If the mac-based option is specified, then MAC-based dot1x authentication is enabled on the port.

no dot1x port-control

This command sets the 802.1X port control mode on the specified port to the default value.

dot1x port-control all

This command sets the authentication mode to use on all ports. Select force-authorized to specify that the authenticator PAE unconditionally sets the controlled port to unauthorized. Select force-authorized to specify that the authenticator PAE unconditionally sets the controlled port to authorized. Select auto to specify that the authenticator PAE sets the controlled port mode to reflect the outcome of the authentication exchanges between the supplicant, authenticator and the authentication server. If the mac-based option is specified, then MAC-based dot1x authentication is enabled on the port.

no dot1x port-control all

This command sets the authentication mode on all ports to the default value.

dot1x re-authenticate

This command begins the re-authentication sequence on the specified port. This command is only valid if the control mode for the specified port is auto or mac-based. If the control mode is not auto or mac-based, an error will be returned.

dot1x re-authentication

This command enables re-authentication of the supplicant for the specified interface or range of interfaces.

no dot1x re-authentication

This command disables re-authentication of the supplicant for the specified port.

dot1x system-auth-control

Use this command to enable the dot1x authentication support on the switch. While disabled, the dot1x configuration is retained and can be changed, but is not activated.

no dot1x system-auth-control

This command is used to disable the dot1x authentication support on the switch.

dot1x system-auth-control monitor

Use this command to enable the 802.1X monitor mode on the switch. The purpose of Monitor mode is to help troubleshoot port-based authentication configuration issues without disrupting network access for hosts connected to the switch. In Monitor mode, a host is granted network access to an 802.1X-enabled port even if it fails the authentication process. The results of the process are logged for diagnostic purposes.

no dot1x system-auth-control monitor

This command disables the 802.1X Monitor mode on the switch.

dot1x timeout

This command sets the value, in seconds, of the timer used by the authenticator state machine on an interface or range of interfaces. Depending on the token used and the value (in seconds) passed, various timeout configurable parameters are set. The following tokens are supported:

no dot1x timeout

This command sets the value, in seconds, of the timer used by the authenticator state machine on this port to the default values. Depending on the token used, the corresponding default values are set.

dot1x unauthenticated-vlan

Use this command to configure the unauthenticated VLAN associated with the specified interface or range of interfaces. The unauthenticated VLAN ID can be a valid VLAN ID from 0-Maximum supported VLAN ID (4093 for TEJOS). The unauthenticated VLAN must be statically configured in the VLAN database to be operational. By default, the unauthenticated VLAN is 0, i.e. invalid and not operational.

no dot1x unauthenticated-vlan

This command resets the unauthenticated-vlan associated with the port to its default value.

dot1x user

This command adds the specified user to the list of users with access to the specified port or all ports. The <user> parameter must be a configured user.

no dot1x user

This command removes the user from the list of users with access to the specified port or all ports.

show authentication methods

Use this command to display information about the authentication methods.

show authentication sessions

Use this command to display information about the authentication sessions.

The display parameters for above command are:

show dot1x

This command is used to show a summary of the global dot1x configuration, summary information of the dot1x configuration for a specified port or all ports, the detailed dot1x configuration for a specified port and the dot1x statistics for a specified port - depending on the tokens used.

If you do not use the optional parameters <unit/slot/port> or<vlanid>, the command displays the global dot1x mode, the VLAN Assignment mode, and the Dynamic VLAN Creation mode.

If you use the optional parameter summary {<unit/slot/port> | all}, the dot1x configuration for the specified port or all ports are displayed.

If you use the optional parameter 'detail <unit/slot/port>', the detailed dot1x configuration for the specified port is displayed.

If you use the optional parameter statistics <unit/slot/port>, the following dot1x statistics for the specified port appear.

show dot1x authentication-history

This command displays 802.1X authentication events and information during successful and unsuccessful Dot1x authentication process for all interfaces or the specified interface. Use the optional keywords to display only failure authentication events in summary or in detail.

The display parameters for above command are:

show dot1x clients

This command displays 802.1X client information. This command also displays information about the number of clients that are authenticated using Monitor mode and using 802.1X.

The display parameters for above command are:

show dot1x users

This command displays 802.1X port security user information for locally configured users.

The display parameters for above command are:

dot1x auth-violation

This command will set the action to be taken on authentication violation. Violation occurs when 802.1x authenticator detects an authentication failure, supplicant fails to provide correct authentication information. When it is set to restrict, on authentication failure 802.1x will wait for quiteperiod and again send authentication request. If it is set to shutdown then on authentication failure the interface is moved to admin disable state. Default violation action is shutdown.

no dot1x auth-violation

This command set the violation action to default value, shutdown.

show dot1x auth-violation

This command displays the authentication violation settings, restrict or shutdown.

The display parameters for above command are:

See also

Switching Commands

Port Configuration Commands

Spanning Tree Protocol (STP) Commands

VLAN Commands

Private VLAN Commands

Ethernet Ring Protection Commands

Double VLAN Commands

Voice VLAN Commands

Provider Bridge Commands

802.1AS Timesync Commands

Provisioning (IEEE 802.1p) Commands

Protected Ports Commands

GARP Commands

GVRP Commands

GMRP Commands

Switch Port Auto-recovery (SPAR) Commands

802.1X Supplicant Commands

Storm-Control Commands

Link Local Protocol Filtering Commands

MMRP Commands

MSRP Commands

MVRP Commands

Port-Channel/LAG (802.3ad) Commands

Port Mirroring

Static MAC Filtering

DHCP L2 Relay Agent Comamnds

DHCP Client Commands

DHCP Snooping Configuration Commands

Dynamic ARP Inspection Commands

IGMP Snooping Configuration Commands

IGMP Snooping Querier Commands

MLD Snooping Commands

MLD Snooping Querier Commands

Port Security Commands

LLDP (802.1AB) Commands

LLDP-MED Commands

Denial of Service Commands

MAC Database Commands

ISDP Commands

Ethernet in the First Mile Operations and Maintenance Commands

Connectivity Fault Management Commands