Try this Configuration Process
The following example shows a WebAuth fallback profile:
ip admission name IP_ADMIN_RULE proxy http
ip access-list extended PRE_WEBAUTH_POLICY
permit udp any any eq bootps
permit udp any any eq domain
fallback profile WEB_AUTH_PROFILE
ip access-group PRE_WEBAUTH_POLICY in
ip admission IP_ADMIN_RULE
The following example shows all the required elements of a configuration for IEEE 802.1X with WebAuth fallback in the order they would appear in the command-line interface (CLI): aaa authentication dot1x default group radius aaa authentication login default group radius aaa authorization network default group radius aaa authorization auth-proxy default group radius aaa accounting dot1x default start-stop group radius aaa accounting auth-proxy default start-stop group radius ip admission name IP_ADMIN_RULE proxy http fallback profile WEB_AUTH_PROFILE ip access-group PRE_WEBAUTH_POLICY in ip admission IP_ADMIN_RULE dot1x system-auth-control !
interface Gigabit 1/0/5
switchport access vlan 30 authentication port-control auto authentication fallback WEB_AUTH_PROFILE ip access-list extended PRE_WEBAUTH_POLICY permit udp any any eq bootps permit udp any any eq domain! radius-server host 10.100.10.117 key cisco123
radius-server vsa send authentication
http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/app_note_c27-577494.html