cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
458
Views
1
Helpful
3
Replies
1 Accepted Solution

Accepted Solutions

M02@rt37
VIP
VIP

Hello @Jason2005 

These commands are used to configure authentication settings on a switch port. The command authentication host-mode multi-auth is used to enable multi-authentication mode on the interface, allowing multiple devices to authenticate independently through the same port. This is commonly used when multiple devices, such as a phone and a computer, share the same Ethernet port. The command authentication port-control auto configures the port control mode for authentication as "auto", meaning the switch dynamically determines whether to enforce authentication based on the attached device's capabilities. If the device supports authentication and sends a request, authentication is enabled for that device. If no authentication request is received, the port remains in an unauthenticated state, allowing non-authentication capable devices to connect without authentication. Together, these commands facilitate secure authentication on the switch port while accommodating devices with different authentication requirements.

 

Best regards
.ı|ı.ı|ı. If This Helps, Please Rate .ı|ı.ı|ı.

View solution in original post

3 Replies 3

M02@rt37
VIP
VIP

Hello @Jason2005 

These commands are used to configure authentication settings on a switch port. The command authentication host-mode multi-auth is used to enable multi-authentication mode on the interface, allowing multiple devices to authenticate independently through the same port. This is commonly used when multiple devices, such as a phone and a computer, share the same Ethernet port. The command authentication port-control auto configures the port control mode for authentication as "auto", meaning the switch dynamically determines whether to enforce authentication based on the attached device's capabilities. If the device supports authentication and sends a request, authentication is enabled for that device. If no authentication request is received, the port remains in an unauthenticated state, allowing non-authentication capable devices to connect without authentication. Together, these commands facilitate secure authentication on the switch port while accommodating devices with different authentication requirements.

 

Best regards
.ı|ı.ı|ı. If This Helps, Please Rate .ı|ı.ı|ı.

Jason2005
Level 1
Level 1

Please I need a detailed explaination on for those commands, I did read sp many documentation but they weren't clear enough :
SW2(config)#interface Ethernet0/1
SW2(config-if)#description win10 node
SW2(config-if)#switchport access vlan 20
SW2(config-if)#switchport mode access
SW2(config-if)#authentication host-mode multi-auth
SW2(config-if)#authentication port-control auto
SW2(config-if)#mab
SW2(config-if)#dot1x pae authenticator
SW2(config-if)#dot1x timeout tx-period 10
SW2(config-if)#spanning-tree portfast edge
SW2(config-if)#authentication event fail action next-method
SW2(config-if)#authentication order dot1x mab