To set the PNAC related information or configure the dot1x parameters for a specified port, use the command dot1x in Interface Configuration Mode. The no form of the command resets the parameters to their default value or to no authentication, and disables periodic re-authentication from authenticator to client.
Parameter | Type | Description |
---|---|---|
access-control |
Enter to configure the supplicant access control. This setting is for the application of the Supplicant authorization state when the port is operating as both Supplicant and Authenticator. | |
|
Enter to configure the port to apply both the Supplicant authorization state and Authenticator authorization state | |
inactive |
Enter to configure the port to use only the Authenticator authorization state to restrict access to the port and not the Supplicant authorization state. This is the default option | |
auth-mode |
Enter to configure the authentication mode of a port as either port-based (which is also known as multi-host) or mac-based (which is also known as single-host). Port based authentication has different modes of authentication. MAC based authentication allows secured mac addresses to pass through the port. Non-secure MAC addresses are dropped. | |
port-based |
Enter to configure the port’s authentication mode as port-based. The port authenticates the host to use the restricted resource. The port state is changed to authorize. The traffic flows through the port without any access restriction till any event that causes the port state to become unauthorized. This is default option. | |
mac-based |
Enter to configure the port’s authentication mode as MAC-based. Upon
receiving tagged/untagged data/control frames from the CFA Module,
it checks if the source MAC is present in the Authenticator Session
Table and if it is authorized.
|
|
control-direction |
Enter to configure configures port control direction. The switch port authenticates incoming packets and outgoing packets. The direction can be configured manually by selecting either in or both. | |
in |
Enter to configure the port to authenticate only the incoming packets. | |
both |
Enter to configure the port to authenticate both incoming and outgoing packets. This is the default option. | |
default |
Enter to configure dot1x with default values for this port. The previous configurations on this port are reset to the default values. These details are not displayed but are the basic settings for a port. | |
disable |
Enter to disable dot1x on the specified port. | |
enable |
Enter to enable dot1x on the specified port. | |
host-mode |
Enter to configure the port authentication mode of a port
as either multi-host (which is also known as port-based) or single-host (which
is also known as mac-based). Multi host authentication has different
Modes of authentication. Single host authentication allows secured
mac addresses to pass through the port. Non-secure mac addresses
are dropped.
Note:
This command is a standardized implementation of the existing command; dot1x auth-mode. It operates similar to the existing command. |
|
multi-host |
Enter to configure the port to multi host authentication mode and perform port-based authentication. With this option, more than one host can be connected to the port using an Ethernet hub attached to the port. This is the default option. | |
single-host |
Enter to configure the port to single host authentication
Mode and perform MAC-based authentication. With this option, only
one host can be connected to the port. Note:
To configure the auth Mode of a port as single-host, port control of the port must be set as auto. |
|
max-req |
Enter to set the maximum number of EAP (Extensible Authentication Protocol) retries to the client by the authenticator before restarting authentication process. | |
<count (1-10)> |
Integer | Enter a value for maximum number of EAP retries to the client by the authenticator before restarting authentication process. The count value ranges between 1 and 10. The default is 2. |
max-start |
Enter to set the maximum number of EAPOL retries to the authenticator. | |
<count (1-65535)> |
Integer | Enter a value for maximum number of EAP retries to the authenticator. The count value ranges between 1 and 65535. The default is 3. |
port-control |
Enter to configure the authenticator port control parameter. The dot1x exercises port based authentication to increase the security of the network. The different modes employed to the ports offer varied access levels. The 802.1x protocol is supported on both Layer 2 static-access ports and Layer 3 routed ports. | |
auto |
Enter to configure the 802.1x authentication process in this port. Causes the port to begin the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port transitions from down to up or when an EAPOL-start frame is received. The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server. The switch can uniquely identify each client attempting to access the network by the client's MAC address. | |
force-authorized |
Enter to configure the port to allow all traffic through this port. Disables 802.1x authentication and causes the port to transit to the authorized state without requiring authentication exchange. The port transmits and receives normal traffic without 802.1x-based authentication of the client. This is the default option. | |
force-unauthorized |
Enter to configure the port to block all traffic through this port. Causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface. | |
reauth-max |
Enter to configure the maximum number of EAP retries to the client. This variable can be tuned to make the port as unauthorized if the supplicant is not available when re-authentication reaches the maximum retry. Lower the value, the port is made unauthorized sooner. | |
<count (1-10)> |
Integer | Enter a value for maximum number of EAP retries to the client. The count value ranges between 1 and 10. The default is 2. |
reauthentication |
Enter to enable periodic re-authentication from authenticator to
client. The periodic re-authentication is requested to ensure if
the same supplicant is accessing the protected resources. The amount
of time between periodic re-authentication attempts can be configured
manually. Note:
This command will execute only if the authenticator port control parameter is auto. |
|
timeout |
Enter to set the dot1x timers. The timer module manages
timers, creates memory pool for timers, creates timer list, starts
and stops timer. It provides handlers to respective expired timers. Note:
Only one timer can be configured using this command, that is, the user can configure either the quiet-period or tx-period, but not both. |
|
auth-period |
Enter to configure the number of seconds that the supplicant waits before timing-out the authenticator. The default is 30 seconds. | |
held-period |
Enter to configure the number of seconds that the supplicant waits before trying to acquire the authenticator.The default is 60 seconds. | |
quiet-period |
Enter to configure the quiet-period or the number of seconds that the switch remains in the quiet state following a failed authentication exchange with the client. The default is 60 seconds. | |
reauth-period |
Enter to configure the reath-period or the number of seconds between re-authentication attempts. The default is 3600 seconds. | |
server-timeout |
Enter to configure the number of seconds that the switch waits for the retransmission of packets to the authentication server. The default is 30 seconds. | |
start-period |
Enter to configure the number of seconds that the supplicant waits between successive retries to the authenticator. The default is 30 seconds. | |
supp-timeout |
Enter to configure the time that the switch waits for the retransmission of packets to the client. The default is 30 seconds. | |
tx-period |
Enter to configure the number of seconds that the switch waits for a response to an EAP-request/identity frame, from the client before retransmitting the request. The default is 30 seconds. | |
<count ((1-65535)> |
Integer | Enter a value for maximum number of EAP retries to the client. The count value ranges between 1 and 65535. |
Interface Configuration Mode
iS5Comm (config-if)# dot1x access-control active
iS5Comm (config-if)# dot1x auth-mode mac-based
iS5Comm(config-if)# dot1x control-direction in
iS5Comm(config-if)# dot1x default
Setting the Default Configuration for Dot1x on this interface
iS5Comm(config-if)# dot1x disable
iS5Comm(config-if)# dot1x enable
iS5Comm(config-if)# dot1x host-mode single-host
iS5Comm(config-if)# dot1x max-req 5
iS5Comm(config-if)# dot1x max-start 2
iS5Comm(config-if)# dot1x port-control auto
iS5Comm(config-if)# dot1x reauth-max 5
iS5Comm(config-if)# dot1x reauthentication
iS5Comm(config-if)# dot1x timeout quiet-period 30