Configuring The Inaccessible Authentication Bypass Feature - Cisco Catalyst 2975 Software Configuration Manual

Ios release 12.2(55)se
Hide thumbs Also See for Catalyst 2975:
Table of Contents

Advertisement

Chapter 10
Configuring IEEE 802.1x Port-Based Authentication
To return to the default value, use the no dot1x auth-fail max-attempts interface configuration
command.
This example shows how to set 2 as the number of authentication attempts allowed before the port moves
to the restricted VLAN:
Switch(config-if)# dot1x auth-fail max-attempts 2

Configuring the Inaccessible Authentication Bypass Feature

You can configure the inaccessible bypass feature, also referred to as critical authentication or the AAA
fail policy.
Beginning in privileged EXEC mode, follow these steps to configure the port as a critical port and enable
the inaccessible authentication bypass feature. This procedure is optional.
Command
Step 1
configure terminal
Step 2
radius-server dead-criteria
time time tries tries
Step 3
radius-server deadtime
minutes
OL-19720-02
Purpose
Enter global configuration mode.
(Optional) Set the conditions that are used to decide when a RADIUS server is
considered unavailable or dead.
The range for time is from 1 to 120 seconds. The switch dynamically determines the
default seconds value that is 10 to 60 seconds.
The range for tries is from 1 to 100. The switch dynamically determines the default
tries parameter that is 10 to 100.
(Optional) Set the number of minutes that a RADIUS server is not sent requests. The
range is from 0 to 1440 minutes (24 hours). The default is 0 minutes.
Configuring 802.1x Authentication
Catalyst 2975 Switch Software Configuration Guide
10-53

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents