01-04-2005 07:24 AM - edited 03-10-2019 01:57 PM
I'm setting up Switch Port Authentication on my Catalysts using the CiscoSecure appliance and the Windows Active Directory user database.
Everything works fine on the lab, but I need a way to enable all ports on the switches when the CiscoSecure is down (no communication from the switch to the CiscoSecure). This way, I could give network access to the users in case my CiscoSecure server goes down.
Any suggestion?
01-04-2005 02:23 PM
In your AAA command, do the following:
> aaa authentication dot1x default group radius none
The none keyword is a backup authentication method in case the Radius authentication fails (because the server is unavailable, not because of an incorrect username/password), and the switch should authenticate the user automatically.
01-05-2005 10:14 AM
I did as suggested (add the "none" keyword to the aaa configuration) but it's still not working.
The "none" keyword works well with my Tacacs configuration for line access control to the switches and routers, but applied to the Radius configuration as suggested it seems to do nothing (if the ACS is not on the network, the switch ports remains disabled).
01-10-2005 09:15 PM
My apologies, I've been reliably informed that using the "none" keyword on the dot1x auth method does not at this time work.
At this time there is no workaround for when the Radius server is unavailable. Your best bet is to set up a backup Radius server, implement DB Replication between the two to sync up their configs, and configure the backup Radius server on your switches.
01-11-2005 03:52 AM
Thanks a lot. I guess we'll need to setup a backup serer.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide