EasyManuals Logo
Home>Cisco>Network Router>Catalyst 3560-X

Cisco Catalyst 3560-X User Manual

Cisco Catalyst 3560-X
1538 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #340 background imageLoading...
Page #340 background image
1-52
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
To return to the default re-authentication number, use the no dot1x max-reauth-req interface
configuration command.
This example shows how to set 4 as the number of times that the switch restarts the authentication
process before the port changes to the unauthorized state:
Switch(config-if)# dot1x max-reauth-req 4
Enabling MAC Move
MAC move allows an authenticated host to move from one port on the switch to another.
Beginning in privileged EXEC mode, follow these steps to globally enable MAC move on the switch.
This procedure is optional.
This example shows how to globally enable MAC move on a switch:
Switch(config)# authentication mac-move permit
Enabling MAC Replace
MAC replace allows a host to replace an authenticated host on a port.
Beginning in privileged EXEC mode, follow these steps to enable MAC replace on an interface. This
procedure is optional.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
authentication mac-move permit Enable MAC move on the switch.
Step 3
end Return to privileged EXEC mode.
Step 4
show running-config Verify your entries.
Step 5
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
interface interface-id Specify the port to be configured, and enter interface configuration mode.
Step 3
authentication violation {protect |
replace | restrict | shutdown}
Use the replace keyword to enable MAC replace on the interface. The
port removes the current session and initiates authentication with the new
host.
The other keywords have these effects:
• protect: the port drops packets with unexpected MAC addresses
without generating a system message.
• restrict: violating packets are dropped by the CPU and a system
message is generated.
• shutdown: the port is error disabled when it receives an unexpected
MAC address.
Step 4
end Return to privileged EXEc mode.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3560-X and is the answer not in the manual?

Cisco Catalyst 3560-X Specifications

General IconGeneral
BrandCisco
ModelCatalyst 3560-X
CategoryNetwork Router
LanguageEnglish

Related product manuals