Configuring Number Of Authentication Attempts On A Restricted Vlan - Cisco Catalyst 2960-X Security Configuration Manual

Cisco ios release 15.0(2)ex
Hide thumbs Also See for Catalyst 2960-X:
Table of Contents

Advertisement

Configuring a Restricted VLAN
Command or Action
Step 5
authentication event fail action authorize vlan vlan-id
Example:
Switch(config-if)# authentication event fail
action authorize vlan 2
Step 6
end
Example:
Switch(config-if)# end

Configuring Number of Authentication Attempts on a Restricted VLAN

You can configure the maximum number of authentication attempts allowed before a user is assigned to the
restricted VLAN by using the authentication event retry retry count interface configuration command. The
range of allowable authentication attempts is 1 to 3. The default is 3 attempts.
Beginning in privileged EXEC mode, follow these steps to configure the maximum number of allowed
authentication attempts. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. Use one of the following:
4. authentication port-control auto
5. authentication event fail action authorize vlan vlan-id
6. authentication event retry retry count
7. end
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
326
• switchport mode access
• switchport mode private-vlan host
Configuring IEEE 802.1x Port-Based Authentication
Purpose
Specifies an active VLAN as an 802.1x restricted VLAN.
The range is 1 to 4094.
You can configure any active VLAN except an internal
VLAN (routed port), an RSPAN VLAN or a voice VLAN
as an 802.1x restricted VLAN.
Returns to privileged EXEC mode.
OL-29048-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents