Cisco Systems 3560 Manual De Usuario

Descargar
Página de 1288
 
10-62
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 10      Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
This example shows how to configure 802.1x authentication with web authentication as a fallback 
method. 
Switch(config) configure terminal
Switch(config)# ip admission name rule1 proxy http
Switch(config)# fallback profile fallback1
Switch(config-fallback-profile)# ip access-group default-policy in 
Switch(config-fallback-profile)# ip admission rule1 
Switch(config-fallback-profile)# exit
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# switchport mode access 
Switch(config-if)# dot1x port-control auto 
Switch(config-if)# dot1x fallback fallback1 
Switch(config-if)# end
For more information about the authentication fallback and dot1x fallback commands, see the 
command reference for this release. For more information about the ip admission name and ip 
access-group
 commands, see the 
on 
Cisco.com.
Step 9
authentication port-control auto
or 
dot1x port-control auto
Enable 802.1x authentication on the interface.
Step 10
authentication fallback fallback-profile
or 
dot1x fallback fallback-profile
Configure the port to authenticate a client by using web 
authentication when no 802.1x supplicant is detected on the port. 
Any change to the fallback-profile global configuration takes effect 
the next time 802.1x fallback is invoked on the interface.
Note
Web authorization cannot be used as a fallback method 
for 802.1x if the port is configured for multidomain 
authentication.
Step 11
exit
Return to privileged EXEC mode.
Step 12
show authentication interface interface-id
or
show dot1x interface interface-id
Verify your configuration.
Step 13
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Command
Purpose