<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi crni00000  in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077703#M25986</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A href="https://supportforums.cisco.com/users/crni00000" title="View user profile." class="username" lang="" about="/users/crni00000" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;crni00000&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply, i'd like to authorize a vlan in the event when the RADIUS server is no longer contactable and a critical vlan is configured. I've had a look at another 2960-x switch on our network and it does give the "server" option&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;(config-if)#authentication event ?&lt;BR /&gt; fail &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Configure failed authentication actions/parameters&lt;BR /&gt; no-response &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Configure non-responsive host actions&lt;BR /&gt; &lt;STRONG&gt;server &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Configure actions for AAA server events&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Image version: c2960x-universalk9-mz.150-2a.EX5.bin&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Any ideas? Only difference is that this one is a WS-2960x-48TD-L and the other i am trying to configure is a&amp;nbsp;&lt;SPAN&gt;Cisco Catalyst 2960X-48TS-L&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jun 2017 23:53:34 GMT</pubDate>
    <dc:creator>Michael Ly</dc:creator>
    <dc:date>2017-06-19T23:53:34Z</dc:date>
    <item>
      <title>Dot1x inaccessible authentication bypass</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077701#M25981</link>
      <description>&lt;P&gt;Hi there&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Wondering if someone could help me out here i'm trying to configure inaccessible authentication bypass on a 2960-x switch but does not seem to be listing the "server" option, do I have to enter a command to enable this option?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Current image running:&amp;nbsp;c2960x-universalk9-mz.152-5b.E.bin&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;(config-if)#authentication event ?&lt;BR /&gt; fail &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Configure failed authentication actions/parameters&lt;BR /&gt; no-response &amp;nbsp;Configure non-responsive host actions&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Any help would be greatly appreciated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077701#M25981</guid>
      <dc:creator>Michael Ly</dc:creator>
      <dc:date>2019-03-11T07:47:50Z</dc:date>
    </item>
    <item>
      <title>To move unauthenticated hosts</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077702#M25984</link>
      <description>&lt;P&gt;To move unauthenticated hosts to specific VLAN (e.g 100):&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;H4&gt;interface Gi1/0/x&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;authentication port-control auto&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;authentication event fail action authorize vlan 100&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;authentication event no-response action authorize vlan 100&lt;/H4&gt;
&lt;H4&gt;&lt;/H4&gt;
&lt;P&gt;&lt;/P&gt;
&lt;H4&gt;For more information, you can check link&lt;/H4&gt;
&lt;DIV class="book-heading"&gt;
&lt;H5 class="chapter-title"&gt;&lt;A href="http://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_8021x/configuration/15-2mt/sec-ieee-auth-fail-vlan.html" title="IEEE 802.1X Auth Fail VLAN"&gt;IEEE 802.1X Auth Fail VLAN&lt;/A&gt;&lt;/H5&gt;
&lt;/DIV&gt;
&lt;H4&gt;&lt;BR /&gt;&amp;nbsp;&lt;/H4&gt;</description>
      <pubDate>Mon, 19 Jun 2017 13:47:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077702#M25984</guid>
      <dc:creator>Predrag Jovic</dc:creator>
      <dc:date>2017-06-19T13:47:38Z</dc:date>
    </item>
    <item>
      <title>Hi crni00000 </title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077703#M25986</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A href="https://supportforums.cisco.com/users/crni00000" title="View user profile." class="username" lang="" about="/users/crni00000" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;crni00000&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply, i'd like to authorize a vlan in the event when the RADIUS server is no longer contactable and a critical vlan is configured. I've had a look at another 2960-x switch on our network and it does give the "server" option&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;(config-if)#authentication event ?&lt;BR /&gt; fail &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Configure failed authentication actions/parameters&lt;BR /&gt; no-response &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Configure non-responsive host actions&lt;BR /&gt; &lt;STRONG&gt;server &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Configure actions for AAA server events&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Image version: c2960x-universalk9-mz.150-2a.EX5.bin&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Any ideas? Only difference is that this one is a WS-2960x-48TD-L and the other i am trying to configure is a&amp;nbsp;&lt;SPAN&gt;Cisco Catalyst 2960X-48TS-L&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 23:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077703#M25986</guid>
      <dc:creator>Michael Ly</dc:creator>
      <dc:date>2017-06-19T23:53:34Z</dc:date>
    </item>
    <item>
      <title>Command should be available.</title>
      <link>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077704#M25988</link>
      <description>&lt;P&gt;Command should be available. It could be IOS bug similar to &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuq62682/?referring_site=bugquickviewredir" title="BUG"&gt;CSCuq62682&lt;/A&gt;, although 2960-X is not listed here.&lt;/P&gt;
&lt;P&gt;Try to upgrade IOS version.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 04:13:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dot1x-inaccessible-authentication-bypass/m-p/3077704#M25988</guid>
      <dc:creator>Predrag Jovic</dc:creator>
      <dc:date>2017-06-20T04:13:38Z</dc:date>
    </item>
  </channel>
</rss>

