Cisco NM-HD-1V= User Guide - Page 176

dot1x port-control

Page 176 highlights

dot1x port-control 16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series dot1x port-control To enable manual control of the authorization state of the port, use the dot1x port-control command in interface configuration mode. To return to the default setting, use the no form of this command. dot1x port-control {auto | force-authorized | force-unauthorized} no dot1x port-control Syntax Descriptionn auto force-authorized force-unauthorized Enables 802.1x on the interface and cause the port to change to the authorized or unauthorized state based on the 802.1x authentication exchange between the switch and the client. Disables 802.1x on the interface and cause the port to change to the authorized state without any authentication exchange required. The port transmits and receives normal traffic without 802.1x-based authentication of the client. Denies all access through this interface by forcing the port to change to the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface. Defaults The authorization state is force-authorized. Command Modes Interface configuration Command History Release 12.1(6)EA2 12.2(15)ZJ Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. Usage Guidelines The 802.1x protocol is supported on Layer 2 static-access ports. You can use the auto keyword only if the port is not configured as one of these types: • Trunk port-If you try to enable 802.1x on a trunk port, an error message appears, and 802.1x is not enabled. If you try to change the mode of an 802.1x-enabled port to trunk, the port mode is not changed. • EtherChannel port-Before enabling 802.1x on the port, you must first remove it from the EtherChannel. If you try to enable 802.1x on an EtherChannel or on an active port in an EtherChannel, an error appears, and 802.1x is not enabled. If you enable 802.1x on a not-yet active port of an EtherChannel, the port does not join the EtherChannel. • Switch Port Analyzer (SPAN) destination port-You can enable 802.1x on a port that is a SPAN destination port; however, 802.1x is disabled until the port is removed as a SPAN destination. You can enable 802.1x on a SPAN source port. To globally disable 802.1x on the switch, you must disable it on each port. There is no global configuration command for this task. 176 Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
dot1x port-control
176
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
dot1x port-control
To enable manual control of the authorization state of the port, use the
dot1x port-control
command in
interface configuration mode. To return to the default setting, use the
no
form of this command.
dot1x port-control
{
auto
|
force-authorized
|
force-unauthorized
}
no dot1x port-control
Syntax Descriptionn
Defaults
The authorization state is force-authorized.
Command Modes
Interface configuration
Command History
Usage Guidelines
The 802.1x protocol is supported on Layer 2 static-access ports.
You can use the
auto
keyword only if the port is not configured as one of these types:
Trunk port—If you try to enable 802.1x on a trunk port, an error message appears, and 802.1x is not
enabled. If you try to change the mode of an 802.1x-enabled port to trunk, the port mode is not
changed.
EtherChannel port—Before enabling 802.1x on the port, you must first remove it from the
EtherChannel. If you try to enable 802.1x on an EtherChannel or on an active port in an
EtherChannel, an error appears, and 802.1x is not enabled. If you enable 802.1x on a not-yet active
port of an EtherChannel, the port does not join the EtherChannel.
Switch Port Analyzer (SPAN) destination port—You can enable 802.1x on a port that is a SPAN
destination port; however, 802.1x is disabled until the port is removed as a SPAN destination. You
can enable 802.1x on a SPAN source port.
To globally disable 802.1x on the switch, you must disable it on each port. There is no global
configuration command for this task.
auto
Enables 802.1x on the interface and cause the port to change to the authorized
or unauthorized state based on the 802.1x authentication exchange between the
switch and the client.
force-authorized
Disables 802.1x on the interface and cause the port to change to the authorized
state without any authentication exchange required. The port transmits and
receives normal traffic without 802.1x-based authentication of the client.
force-unauthorized
Denies all access through this interface by forcing the port to change to the
unauthorized state, ignoring all attempts by the client to authenticate. The
switch cannot provide authentication services to the client through the interface.
Release
Modification
12.1(6)EA2
This command was introduced.
12.2(15)ZJ
This command was implemented on the following platforms: Cisco 2600
series, Cisco 3600 series, and Cisco 3700 series routers.