Default 802.1X Configuration - Cisco Catalyst 4500 Series Configuration Manual

Release ios xe 3.3.0sg and ios 15.1(1)sg
Hide thumbs Also See for Catalyst 4500 Series:
Table of Contents

Advertisement

Chapter 44
Configuring 802.1X Port-Based Authentication

Default 802.1X Configuration

Table 44-1
Table 44-1
Default 802.1X Configuration
Feature
Authentication, authorization, and accounting (AAA)
RADIUS server
IP address
UDP authentication port
Key
Per-interface 802.1X protocol enable state
Periodic reauthentication
Time between reauthentication attempts
Quiet period
OL-25340-01
Configuring 802.1X with Inaccessible Authentication Bypass, page 44-60
Configuring 802.1X with Unidirectional Controlled Port, page 44-64
Configuring 802.1X with VLAN User Distribution, page 44-66
Configuring 802.1X with Authentication Failed, page 44-68
Configuring 802.1X with Voice VLAN, page 44-70
Configuring 802.1X with VLAN Assignment, page 44-71
Enabling Fallback Authentication, page 44-73
Enabling Periodic Reauthentication, page 44-78
Enabling Multiple Hosts, page 44-80
Changing the Quiet Period, page 44-81
Changing the Switch-to-Client Retransmission Time, page 44-82
Setting the Switch-to-Client Frame-Retransmission Number, page 44-83
Configuring an Authenticator and a Supplicant Switch with NEAT, page 44-85
Manually Reauthenticating a Client Connected to a Port, page 44-91
Initializing the 802.1X Authentication State, page 44-91
Removing 802.1X Client Information, page 44-92
Resetting the 802.1X Configuration to the Default Values, page 44-92
shows the default 802.1X configuration.
(optional)
(optional)
(optional
(optional)
Default Setting
Disabled
None specified
1645
None specified
Force-authorized
The port transmits and receives normal traffic without
802.1X-based authentication of the client.
Disabled
3600 sec
60 sec
Number of seconds that the switch remains in the quiet state
following a failed authentication exchange with the client.
Software Configuration Guide—Release IOS XE 3.3.0SG and IOS 15.1(1)SG
Configuring 802.1X Port-Based Authentication
(optional)
(optional)
(optional)
(optional)
(optional)
(optional)
(optional)
44-27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents