1-52
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
To return to the default re-authentication number, use the no dot1x max-reauth-req interface
configuration command.
This example shows how to set 4 as the number of times that the switch restarts the authentication
process before the port changes to the unauthorized state:
Switch(config-if)# dot1x max-reauth-req 4
Enabling MAC Move
MAC move allows an authenticated host to move from one port on the switch to another.
Beginning in privileged EXEC mode, follow these steps to globally enable MAC move on the switch.
This procedure is optional.
This example shows how to globally enable MAC move on a switch:
Switch(config)# authentication mac-move permit
Enabling MAC Replace
MAC replace allows a host to replace an authenticated host on a port.
Beginning in privileged EXEC mode, follow these steps to enable MAC replace on an interface. This
procedure is optional.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
authentication mac-move permit Enable MAC move on the switch.
Step 3
end Return to privileged EXEC mode.
Step 4
show running-config Verify your entries.
Step 5
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
interface interface-id Specify the port to be configured, and enter interface configuration mode.
Step 3
authentication violation {protect |
replace | restrict | shutdown}
Use the replace keyword to enable MAC replace on the interface. The
port removes the current session and initiates authentication with the new
host.
The other keywords have these effects:
• protect: the port drops packets with unexpected MAC addresses
without generating a system message.
• restrict: violating packets are dropped by the CPU and a system
message is generated.
• shutdown: the port is error disabled when it receives an unexpected
MAC address.
Step 4
end Return to privileged EXEc mode.