Configuring Mac Authentication Bypass - Cisco 3750G - Catalyst Integrated Wireless LAN Controller Configuration Manual

Software configuration guide
Hide thumbs Also See for 3750G - Catalyst Integrated Wireless LAN Controller:
Table of Contents

Advertisement

Configuring IEEE 802.1x Authentication
Command
Step 4
end
Step 5
show dot1x interface interface-id
Step 6
copy running-config startup-config
To disable IEEE 802.1x authentication with WoL, use the no dot1x control-direction interface
configuration command.
This example shows how to enable IEEE 802.1x authentication with WoL and set the port as
bidirectional:
Switch(config-if)# dot1x control-direction both

Configuring MAC Authentication Bypass

Beginning in privileged EXEC mode, follow these steps to enable MAC authentication bypass. This
procedure is optional.
Command
Step 1
configure terminal
Step 2
interface interface-id
Step 3
dot1x port-control auto
Step 4
dot1x mac-auth-bypass [eap | timeout
activity {value}]
Step 5
end
Step 6
show dot1x interface interface-id
Step 7
copy running-config startup-config
To disable MAC authentication bypass, use the no dot1x mac-auth-bypass interface configuration
command.
This example shows how to enable MAC authentication bypass:
Switch(config-if)# dot1x mac-auth-bypass
Catalyst 3750 Switch Software Configuration Guide
10-40
Chapter 10
Purpose
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Purpose
Enter global configuration mode.
Specify the port to be configured, and enter interface configuration mode.
For the supported port types, see the
Configuration Guidelines" section on page
Enable IEEE 802.1x authentication on the port.
Enable MAC authentication bypass.
(Optional) Use the eap keyword to configure the switch to use EAP for
authorization.
(Optional) Use the timeout activity keywords to configured the number
of seconds that a connected host can be inactive before it is placed in an
unauthorized state. The range is 1 to 65535.
You must enable port security before configuring a time out value. For
more information, see the
page
25-8.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Configuring IEEE 802.1x Port-Based Authentication
"IEEE 802.1x Authentication
10-23.
"Configuring Port Security" section on
OL-8550-02

Advertisement

Table of Contents
loading

Table of Contents