Installation guide

Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
How to Configure EtherSwitch HWICs
20
Cisco IOS Release 12.3(8)T4
OL-6454-01
7. show dot1x
8. copy running-config startup-config
DETAILED STEPS
To disable AAA, use the no aaa new-model global configuration command. To disable 802.1x AAA
authentication, use the no aaa authentication dot1x {default | list-name} method1 [method2...] global
configuration command. To disable 802.1x, use the dot1x port-control force-authorized or the no
dot1x port-control interface configuration command.
Configuring the Switch-to-RADIUS-Server Communication
RADIUS security servers are identified by their host name or IP address, host name and specific UDP
port numbers, or IP address and specific UDP port numbers. The combination of the IP address and UDP
port number creates a unique identifier, which enables RADIUS requests to be sent to multiple UDP
ports on a server at the same IP address. If two different host entries on the same RADIUS server are
configured for the same service—for example, authentication—the second host entry configured acts as
the fail-over backup to the first one. The RADIUS host entries are tried in the order that they were
configured.
Command Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
aaa new-model
Enables AAA.
Step 3
aaa authentication dot1x {default |
listname
}
method1
[
method2
...]
Creates an 802.1x authentication method list.
To create a default list that is used when a named list is not specified in
the authentication command, use the default keyword followed by the
methods that are to be used in default situations. The default method list
is automatically applied to all interfaces.
Enter at least one of these keywords:
group radius—Use the list of all RADIUS servers for authentication.
none—Use no authentication. The client is automatically
authenticated without the switch using the information supplied by
the client.
Step 4
interface
interface-id
Enters interface configuration mode, and specify the interface to be
enabled for 802.1x authentication.
Step 5
dot1x port-control auto
Enables 802.1x on the interface.
For feature interaction information with trunk, dynamic, dynamic-access,
EtherChannel, secure, and SPAN ports see the “802.1x Configuration
Guidelines” section on page 19.
Step 6
end
Returns to privileged EXEC mode.
Step 7
show dot1x
Verifies your entries.
Check the Status column in the 802.1x Port Summary section of the
display. An enabled status means the port-control value is set either to
auto or to force-unauthorized.
Step 8
copy running-config startup-config
(Optional) Saves your entries in the configuration file.