PurposeCommand or Action
Returns to privileged EXEC mode.end
Example:
Switch(config-if)# end
Step 7
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice
VLAN
Beginning in privileged EXEC mode, follow these steps to configure critical voice VLAN on a port and enable
the inaccessible authentication bypass feature.
SUMMARY STEPS
1.
configure terminal
2.
aaa new-model
3.
radius-server dead-criteria{time seconds } [tries number]
4.
radius-serverdeadtimeminutes
5.
radius-server host ip-address address[acct-port udp-port][auth-port udp-port] [testusername
name[idle-time time] [ignore-acct-port][ignore auth-port]] [key string]
6.
dot1x critical {eapol | recovery delay milliseconds}
7.
interface interface-id
8.
authentication event server dead action {authorize | reinitialize} vlan vlan-id]
9.
switchport voice vlan vlan-id
10.
authentication event server dead action authorize voice
11.
show authentication interface interface-id
12.
copy running-config startup-config
DETAILED STEPS
PurposeCommand or Action
Enters the global configuration mode.configure terminal
Example:
Switch# configure terminal
Step 1
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
328 OL-29048-01
Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN