Disabling 802.1X Authentication On The Cisco Nx-Os Device - Cisco Nexus 9000 Series Configuration Manual

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Advertisement

Disabling 802.1X Authentication on the Cisco NX-OS Device

Disabling 802.1X Authentication on the Cisco NX-OS Device
You can disable 802.1X authentication on the Cisco NX-OS device. By default, the Cisco NX-OS software
enables 802.1X authentication after you enable the 802.1X feature. However, when you disable the 802.1X
feature, the configuration is removed from the Cisco NX-OS device. The Cisco NX-OS software allows you
to disable 802.1X authentication without losing the 802.1X configuration.
Note
When you disable 802.1X authentication, the port mode for all interfaces defaults to force-authorized regardless
of the configured port mode. When you reenable 802.1X authentication, the Cisco NX-OS software restores
the configured port mode on the interfaces.
Before you begin
Enable the 802.1X feature on the Cisco NX-OS device.
SUMMARY STEPS
1. configure terminal
2. no dot1x system-auth-control
3. exit
4. (Optional) show dot1x
5. (Optional) copy running-config startup-config
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
switch# configure terminal
switch(config)#
Step 2
no dot1x system-auth-control
Example:
switch(config)# no dot1x system-auth-control
Step 3
exit
Example:
switch(config)# exit
switch#
Step 4
(Optional) show dot1x
Example:
switch# show dot1x
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
198
Purpose
Enters global configuration mode.
Disables 802.1X authentication on the Cisco NX-OS device.
The default is enabled.
Note
Use the dot1x system-auth-control command
to enable 802.1X authentication on the Cisco
NX-OS device.
Exits configuration mode.
Displays the 802.1X feature status.
Configuring 802.1X

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents