802.1X Authentication Configuration Guidelines - Cisco IE-3000-8TC Software Configuration Manual

Software configuration guide
Hide thumbs Also See for IE-3000-8TC:
Table of Contents

Advertisement

Configuring 802.1x Authentication
Table 12-4
Default 802.1x Authentication Configuration (continued)
Feature
Host mode
Control direction
Periodic re-authentication
Number of seconds between
re-authentication attempts
Re-authentication number
Quiet period
Retransmission time
Maximum retransmission number
Client timeout period
Authentication server timeout period
Inactivity timeout
Guest VLAN
Inaccessible authentication bypass
Restricted VLAN
Authenticator (switch) mode
MAC authentication bypass

802.1x Authentication Configuration Guidelines

Cisco IE 3000 Switch Software Configuration Guide
12-28
Default Setting
Single-host mode.
Bidirectional control.
Disabled.
3600 seconds.
2 times (number of times that the switch restarts the authentication process
before the port changes to the unauthorized state).
60 seconds (number of seconds that the switch remains in the quiet state
following a failed authentication exchange with the client).
30 seconds (number of seconds that the switch should wait for a response to an
EAP request/identity frame from the client before resending the request).
2 times (number of times that the switch will send an EAP-request/identity
frame before restarting the authentication process).
30 seconds (when relaying a request from the authentication server to the
client, the amount of time the switch waits for a response before resending the
request to the client.)
30 seconds (when relaying a response from the client to the authentication
server, the amount of time the switch waits for a reply before resending the
response to the server.)
You can change this timeout period by using the authentication timer server
or dot1x timeout server-timeout interface configuration command.
Disabled.
None specified.
Disabled.
None specified.
None specified.
Disabled.
802.1x Authentication, page 12-29
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass,
page 12-29
MAC Authentication Bypass, page 12-30
Maximum Number of Allowed Devices Per Port, page 12-30
Chapter 12
Configuring IEEE 802.1x Port-Based Authentication
OL-13018-03

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ie 3000

Table of Contents