10-52
Catalyst 3750 SwitchSoftware Configuration Guide
OL-8550-09
Chapter10 Configuring IEEE 802.1x Port-Based Authentication
Configuring 802.1x Authentication
Beginning in privileged EXEC mode, follow these steps to globally enable MAC move on the switch.
This procedure is optional.
This example shows how to globally enable MAC move on a switch:
Switch(config)# authentication mac-move permit
Enabling MAC Replace
MAC replace allows a host to replace an authenticated host on a port.
Beginning in privileged EXEC mode, follow these steps to enable MAC replace on an interface. This
procedure is optional.
This example shows how to enable MAC replace on an interface:
Switch(config)# interface gigabitethernet2/0/2
Switch(config-if)# authentication violation replace
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 authentication mac-move permit Enable MAC move on the switch.
Step3 end Return to privileged EXEC mode.
Step4 show running-config (Optional) Verify your entries.
Step5 copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 interface interface-id Specify the port to be configured, and enter interface configuration mode.
Step3 authentication violation {protect |
replace | restrict | shutdown}
Use the replace keyword to enable MAC replace on the interface. The
port removes the current session and initiates authentication with the new
host.
The other keywords have these effects:
protect: the port drops packets with unexpected MAC addresses
without generating a system message.
restrict: violating packets are dropped by the CPU and a system
message is generated.
shutdown: the port is error disabled when it receives an unexpected
MAC address.
Step4 end Return to privileged EXEc mode.
Step5 show running-config Verify your entries.
Step6 copy running-config startup-config (Optional) Saves your entries in the configuration file.