10-62
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 10 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
This example shows how to configure 802.1x authentication with web authentication as a fallback
method.
Switch(config) configure terminal
Switch(config)# ip admission name rule1 proxy http
Switch(config)# fallback profile fallback1
Switch(config-fallback-profile)# ip access-group default-policy in
Switch(config-fallback-profile)# ip admission rule1
Switch(config-fallback-profile)# exit
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# switchport mode access
Switch(config-if)# dot1x port-control auto
Switch(config-if)# dot1x fallback fallback1
Switch(config-if)# end
For more information about the authentication fallback and dot1x fallback commands, see the
command reference for this release. For more information about the ip admission name and ip
access-group commands, see the Network Admission Control Software Configuration Guide on
Cisco.com.
Step 9 authentication port-control auto
or
dot1x port-control auto
Enable 802.1x authentication on the interface.
Step 10 authentication fallback fallback-profile
or
dot1x fallback fallback-profile
Configure the port to authenticate a client by using web
authentication when no 802.1x supplicant is detected on the port.
Any change to the fallback-profile global configuration takes effect
the next time 802.1x fallback is invoked on the interface.
Note Web authorization cannot be used as a fallback method
for 802.1x if the port is configured for multidomain
authentication.
Step 11 exit Return to privileged EXEC mode.
Step 12 show authentication interface interface-id
or
show dot1x interface interface-id
Verify your configuration.
Step 13 copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose