Cisco HWIC-4ESW and HWIC-D-9ESW
EtherSwitch Interface Cards
First Published: May 17, 2005
Last Updated: April 15, 2006
This document provides configuration tasks for the 4-port Cisco HWIC-4ESW and the 9-port
Cisco HWIC-D-9ESW EtherSwitch high-speed WAN interface cards (HWICs) hardware feature
supported on Cisco 1800 (modular), Cisco 2800, and Cisco 3800 series integrated services routers.
Cisco EtherSwitch HWICs are 10/100BASE-T Layer 2 Ethernet switches with Layer 3 routing
capability. (Layer 3 routing is forwarded to the host and is not actually performed at the switch.) Traffic
between different VLANs on a switch is routed through the router platform. Any one port on a
Cisco EtherSwitch HWIC may be configured as a stacking port to link to another Cisco EtherSwitch
HWIC or EtherSwitch network module in the same system. An optional power module can also be added
to provide inline power for IP telephones. The HWIC-D-9ESW HWIC requires a double-wide card slot.
This hardware feature does not introduce any new or modified Cisco IOS commands.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. To reach
links to specific feature documentation in this module and to see a list of the releases in which each feature is
supported, use the “Feature Information for the Cisco HWIC-4ESW and the Cisco HWIC-D-9ESW
EtherSwitch Cards” section on page 117.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image
support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on
Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at
the login dialog box and follow the instructions that appear.
Corporate Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Contents
Contents
The following sections provide information about the Cisco EtherSwitch HWICs.
• Prerequisites for EtherSwitch HWICs, page 2
• Restrictions for EtherSwitch HWICs, page 2
• Information About EtherSwitch HWICs, page 3
• How to Configure EtherSwitch HWICs, page 5
• Configuration Examples for EtherSwitch HWICs, page 106
• Additional References, page 116
• Command Reference, page 117
Prerequisites for EtherSwitch HWICs
The following are prerequisites to configuring EtherSwitch HWICs:
• Configuration of IP routing. (Refer to the Cisco IOS IP Configuration Guide.)
• Use of the Cisco IOS T release, beginning with Release 12.3(8)T4 or later for Cisco HWIC-4ESW
and Cisco HWIC-D-9ESW support. (Refer to the Cisco IOS documentation.)
Restrictions for EtherSwitch HWICs
The following restrictions apply to the Cisco HWIC-4ESW and the Cisco HWIC-D-9ESW EtherSwitch
HWICs:
• No more than two Ethernet Switch HWICs or network modules may be installed in a host router.
Multiple Ethernet Switch HWICs or network modules installed in a host router will not act
independently of each other. They must be stacked, as they will not work at all otherwise.
• The ports of a Cisco EtherSwitch HWIC must NOT be connected to the Fast Ethernet/Gigabit
onboard ports of the router.
• There is no inline power on the ninth port (port 8) of the HWIC-D-9ESW card.
• There is no Auto MDIX support on the ninth port (port 8) of the HWIC-D-9ESW card when either
speed or duplex is not set to auto.
• There is no support for online insertion/removal (OIR) of the EtherSwitch HWICs.
• When Ethernet Switches have been installed and configured in a host router, OIR of the
CompactFlash memory card in the router must not occur. OIR of the CompactFlash memory card
will compromise the configuration of the Ethernet Switches.
• VTP pruning is not supported.
• There is a limit of 200 secure MAC addresses per module that can be supported by an EtherSwitch
HWIC.
Book Title
2
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Prerequisites for Installing Two Ethernet Switch Network Modules in a Single Chassis
Prerequisites for Installing Two Ethernet Switch Network
Modules in a Single Chassis
A maximum of two Ethernet switch network modules can be installed in a single chassis. If two Ethernet
switch network modules of any type are installed in the same chassis, the following configuration
requirements must be met:
• Both Ethernet switch network modules must have an optional Gigabit Ethernet expansion board
installed.
• An Ethernet crossover cable must be connected to the two Ethernet switch network modules using
the optional Gigabit Ethernet expansion board ports.
• Intrachassis stacking for the optional Gigabit Ethernet expansion board ports must be configured.
For information about intrachassis stacking configuration, see the 16- and 36-Port Ethernet Switch
Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 series feature document.
NoteWithout this configuration and connection, duplications will occur in the VLAN databases, and
unexpected packet handling may occur.
Information About EtherSwitch HWICs
To configure the Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch HWICs, you should understand the
following concepts:
• VLANs, page 3
• Inline Power for Cisco IP Phones, page 4
• Layer 2 Ethernet Switching, page 4
• 802.1x Authentication, page 4
• Spanning Tree Protocol, page 4
• Cisco Discovery Protocol, page 4
• Switched Port Analyzer, page 4
• IGMP Snooping, page 4
• Storm Control, page 5
• Intrachassis Stacking, page 5
• Fallback Bridging, page 5
VLANs
For information on the concept of VLANs, refer to the material at this URL:
Enter the show vlan-switch brief command in EXEC mode, using the Cisco IOS CLI to verify that a
VLAN has been deleted from the switch, as shown in the following output example:
Router# show vlan-switch brief
VLAN Name Status Ports
---- -------------------------------- --------- ------------------------------1 default active Fa0/1/0, Fa0/1/1, Fa0/1/2
Fa0/1/3, Fa0/1/4, Fa0/1/5
Fa0/1/6, Fa0/1/7, Fa0/1/8
300 VLAN0300 active
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
Router#
Configuring VLAN Trunking Protocol
This section describes how to configure the VLAN Trunking Protocol (VTP) on an EtherSwitch HWIC,
and contains the following tasks:
• Configuring a VTP Server, page 10
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
• Configuring a VTP Client, page 12
• Disabling VTP (VTP Transparent Mode), page 12
• Verifying VTP, page 13
NoteVTP pruning is not supported by EtherSwitch HWICs.
Configuring a VTP Server
When a switch is in VTP server mode, you can change the VLAN configuration and have it propagate
throughout the network.
Follow the steps below to configure the switch as a VTP server.
SUMMARY STEPS
1. enable
2. vlan database
3. vtp server
4. vtp domain domain_name
5. vtp password password_value
6. exit
10
Book Title
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
DETAILED STEPS
How to Configure EtherSwitch HWICs
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
enable
Example:
Router> enable
vlan database
Example:
Router# vlan database
vtpserver
Example:
Router(vlan)# vtp server
vtp domaindomain_name
Example:
Router(vlan)# vtp domain distantusers
vtp password password_value
Example:
Router(vlan)# vtp password philadelphis
exit
Example:
Router(vlan)# exit
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters VLAN configuration mode.
Configures the switch as a VTP server.
Defines the VTP domain name, which can be up to 32 characters
long.
(Optional) Sets a password, which can be from 8 to 64 characters
long, for the VTP domain.
Updates the VLAN database, propagates it throughout the
administrative domain, exits VLAN configuration mode, and
returns to privileged EXEC mode.
Book Title
11
How to Configure EtherSwitch HWICs
Configuring a VTP Client
When a switch is in VTP client mode, you cannot change the VLAN configuration on the switch. The
client switch receives VTP updates from a VTP server in the management domain and modifies its
configuration accordingly.
Follow the steps below to configure the switch as a VTP client.
SUMMARY STEPS
1. enable
2. vlan database
3. vtp client
4. exit
DETAILED STEPS
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Step 1
enable
Example:
Router> enable
Step 2
vlan database
Example:
Router# vlan database
Step 3
vtp client
Example:
Router(vlan)# vtp client
Step 4
exit
Example:
Router(vlan)# exit
Disabling VTP (VTP Transparent Mode)
When you configure the switch as VTP transparent, you disable VTP on the switch. A VTP transparent
switch does not send VTP updates and does not act on VTP updates received from other switches.
Follow the steps below to disable VTP on the switch.
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters VLAN configuration mode.
Configures the switch as a VTP client.
Updates the VLAN database, propagates it throughout the
administrative domain, exits VLAN configuration mode and
returns to privileged EXEC mode.
SUMMARY STEPS
Book Title
12
1. enable
2. vlan database
3. vtp transparent
4. exit
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
DETAILED STEPS
How to Configure EtherSwitch HWICs
Step 1
enable
Example:
Router> enable
Step 2
vlan database
Example:
Router# vlan database
Step 3
vtp transparent
Example:
Router(vlan)# vtp transparent
Step 4
exit
Example:
Router(vlan)# exit
Verifying VTP
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters VLAN configuration mode.
Configures VTP transparent mode.
Updates the VLAN database, propagates it throughout the
administrative domain, exits VLAN configuration mode, and
returns to privileged EXEC mode.
Use the show vtp status command to verify VTP status:
Router# show vtp status
VTP Version : 2
Configuration Revision : 0
Maximum VLANs supported locally : 256
Number of existing VLANs : 5
VTP Operating Mode : Server
VTP Domain Name :
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0xBF 0x86 0x94 0x45 0xFC 0xDF 0xB5 0x70
Configuration last modified by 0.0.0.0 at 0-0-00 00:00:00
Local updater ID is 1.3.214.25 on interface Fa0/0 (first interface found)
Router#
Configuring Layer 2 Interfaces
This section provides the following configuration information:
• Configuring a Range of Interfaces, page 14 (required)
• Interface Speed and Duplex Configuration Guidelines, page 15
• Configuring the Interface Speed, page 16
• Configuring the Interface Duplex Mode, page 16
• Verifying Interface Speed and Duplex Mode Configuration, page 17
• Configuring a Description for an Interface, page 18
• Configuring a Fast Ethernet Interface as a Layer 2 Trunk, page 19
• Configuring a Fast Ethernet Interface as Layer 2 Access, page 21
Interface Speed and Duplex Configuration Guidelines
When configuring an interface speed and duplex mode, note these guidelines:
• If both ends of the line support autonegotiation, Cisco highly recommends the default auto
negotiation settings.
• If one interface supports auto negotiation and the other end does not, configure duplex and speed on
both interfaces; do not use the auto setting on the supported side.
• Both ends of the line need to be configured to the same setting; for example, both hard-set or both
auto-negotiate. Mismatched settings are not supported.
Book Title
15
How to Configure EtherSwitch HWICs
CautionChanging the interface speed and duplex mode configuration might shut down and reenable the interface
during the reconfiguration.
Configuring the Interface Speed
Use the following task to set the interface speed.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface fastethernet interface-id
4. speed [10 | 100 | auto]
DETAILED STEPS
Command or ActionPurpose
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters global configuration mode.
Example:
Router# configure terminal
Step 3
interface fastethernet interface-id
Example:
Router(config)# interface fastethernet 0/1/0
Step 4
speed [10 | 100 | auto ]
Example:
Router(config-if)# speed 100
NoteIf you set the interface speed to auto on a 10/100-Mbps Ethernet interface, both speed and duplex are
automatically negotiated.
Configuring the Interface Duplex Mode
Follow the steps below to set the duplex mode of a Fast Ethernet interface.
Selects the interface to be configured.
Selects the interface to be configured.
16
Book Title
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
SUMMARY STEPS
1. enable
2. configure terminal
3. interface fastethernet interface-id
4. duplex [auto | full | half]
DETAILED STEPS
Command or ActionPurpose
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface fastethernet interface-id
How to Configure EtherSwitch HWICs
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters global configuration mode.
Selects the interface to be configured.
Example:
Router(config)# interface fastethernet 0/1/0
Step 4
duplex [auto | full | half]
Example:
Router(config-if)# duplex auto
NoteIf you set the port speed to auto on a 10/100-Mbps Ethernet interface, both speed and duplex are
automatically negotiated. You cannot change the duplex mode of auto negotiation interfaces.
The following example shows how to set the interface duplex mode to auto on Fast Ethernet interface 3:
Router(config)# interface fastethernet 0/1/0
Router(config-if)# speed 100
Router(config-if)# duplex auto
Router(config-if)# end
Verifying Interface Speed and Duplex Mode Configuration
Use the show interfaces command to verify the interface speed and duplex mode configuration for an
interface, as shown in the following output example.
Router# show interfaces fastethernet 0/1/0
Sets the duplex mode of the interface.
FastEthernet0/1/0 is up, line protocol is up
Hardware is Fast Ethernet, address is 000f.f70a.f272 (bia 000f.f70a.f272)
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Book Title
17
How to Configure EtherSwitch HWICs
Auto-duplex, Auto-speed
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:11, output never, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/40, (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
You can add a description of an interface to help you remember its function. The description appears in
the output of the following commands: show configuration, show running-config, and show interfaces.
Use the description command to add a description for an interface.
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
SUMMARY STEPS
1. enable
2. configure terminal
3. interface fastethernetinterface-id
4. description string
18
Book Title
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
DETAILED STEPS
Command or ActionPurpose
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface fastethernet interface-id
Example:
Router(config)# interface fastethernet 0/1/0
Step 4
description string
How to Configure EtherSwitch HWICs
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters global configuration mode.
Selects the interface to be configured.
Adds a description for an interface.
Example:
Router(config-if)# description newinterface
Configuring a Fast Ethernet Interface as a Layer 2 Trunk
Use this task to configure a Fast Ethernet interface as a Layer 2 trunk.
(Optional) For 802.1Q trunks, specifies the native VLAN.
(Optional) Configures the list of VLANs allowed on the trunk.
All VLANs are allowed by default. You cannot remove any of
the default VLANs from a trunk.
Activates the interface. (Required only if you shut down the
interface.)
Exits configuration mode.
Example:
Router(config-if)# end
Book Title
20
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
NotePorts do not support Dynamic Trunk Protocol (DTP). Ensure that the neighboring switch is set to a mode
that will not send DTP.
Verifying a Fast Ethernet Interface as a Layer 2 Trunk
Use the following show commands to verify the configuration of a Fast Ethernet interface as a Layer 2
trunk.
router# show running-config interfaces fastEthernet 0/3/1
Building configuration...
Current configuration: 71 bytes
!
interface FastEthernet0/3/1
switchport mode trunk
no ip address
end
Router#
Router# show interfaces trunk
Port Mode Encapsulation Status Native vlan
Fa0/3/1 on 802.1q trunking 1
How to Configure EtherSwitch HWICs
Port Vlans allowed on trunk
Fa0/3/1 1-1005
Port Vlans allowed and active in management domain
Fa0/3/1 1
Port Vlans in spanning tree forwarding state and not pruned
Fa0/3/1 1
Router#
Configuring a Fast Ethernet Interface as Layer 2 Access
Follow these steps below to configure a Fast Ethernet interface as Layer 2 access.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface fastethernet interface-id
4. shutdown
5. switchport mode access
6. switchport access vlan vlan-num
7. no shutdown
8. end
Book Title
21
How to Configure EtherSwitch HWICs
DETAILED STEPS
Command or ActionPurpose
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface fastethernet interface-id
Example:
Router(config)# interface fastethernet 0/1/0
Step 4
shutdown
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters global configuration mode.
Selects the interface to be configured.
(Optional) Shuts down the interface to prevent traffic flow
until configuration is complete.
Step 5
Step 6
Step 7
Step 8
Example:
Router(config-if)# shutdown
switchport mode access
Example:
Router(config-if)# switchport mode access
switchport access vlanvlan-num
Example:
Router(config-if)# switchport access vlan 1
no shutdown
Example:
Router(config-if)# no shutdown
end
Example:
Router(config-if)# end
Configures the interface as a Layer 2 access.
For access ports, specifies the access VLAN.
Activates the interface.
• Required only if you shut down the interface.
Exits configuration mode.
22
Verifying a Fast Ethernet Interface as Layer 2 Access
Use the show running-config interface command to verify the running configuration of the interface,
as shown below.
Router# show running-config interface fastethernet 0/1/2
Building configuration...
Current configuration: 76 bytes
!
interface FastEthernet0/1/2
Book Title
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
switchport access vlan 3
no ip address
end
Use the show interfaces command to verify the switchport configuration of the interface, as shown
below.
The port transmits and receives normal traffic without
802.1x-based authentication of the client.
Periodic reauthenticationDisabled.
Number of seconds between
3600 seconds.
reauthentication attempts
Quiet period 60 seconds (number of seconds that the switch remains in
the quiet state following a failed authentication exchange
with the client).
Retransmission time 30 seconds (number of seconds that the switch should
wait for a response to an EAP request/identity frame
from the client before retransmitting the request).
Maximum retransmission number 2 times (number of times that the switch will send an
EAP-request/identity frame before restarting the
authentication process).
Multiple host supportDisabled.
Client timeout period30 seconds (when relaying a request from the
authentication server to the client, the amount of time the
switch waits for a response before retransmitting the
request to the client). This setting is not configurable.
Authentication server timeout period 30 seconds (when relaying a response from the client to
the authentication server, the amount of time the switch
waits for a reply before retransmitting the response to the
server). This setting is not configurable.
24
Book Title
802.1x Configuration Guidelines
These are the 802.1x authentication configuration guidelines:
• When the 802.1x protocol is enabled, ports are authenticated before any other Layer 2 feature is
enabled.
• The 802.1x protocol is supported on Layer 2 static-access ports, but it is not supported on these port
types:
–
Trunk port—If you try to enable 802.1x on a trunk port, an error message appears, and 802.1x
is not enabled. If you try to change the mode of an 802.1x-enabled port to trunk, the port mode
is not changed.
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
–
Switch Port Analyzer (SPAN) destination port—You can enable 802.1x on a port that is a SPAN
destination port; however, 802.1x is disabled until the port is removed as a SPAN destination.
You can enable 802.1x on a SPAN source port.
Enabling 802.1x Authentication
To enable 802.1x port-based authentication, you must enable AAA and specify the authentication
method list. A method list describes the sequence and authentication methods to be queried to
authenticate a user.
The software uses the first method listed to authenticate users; if that method fails to respond, the
software selects the next authentication method in the method list. This process continues until there is
successful communication with a listed authentication method or until all defined methods are
exhausted. If authentication fails at any point in this cycle, the authentication process stops, and no other
authentication methods are attempted.
Beginning in privileged EXEC mode, follow these steps to configure 802.1x port-based authentication.
This procedure is required.
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Creates an 802.1x authentication method list.
• To create a default list that is used when a named list is
not specified in the authentication command, use the
default keyword followed by the methods that are to be
used in default situations. The default method list is
automatically applied to all interfaces.
• Enter at least one of these keywords:
–
group radius—Use the list of all RADIUS servers
for authentication.
–
none—Use no authentication. The client is
automatically authenticated without the switch
using the information supplied by the client.
Enters interface configuration mode and specifies the
interface to be enabled for 802.1x authentication.
Enables 802.1x on the interface.
Step 6
Step 7
Step 8
Example:
Router(config-if)# dot1x port-control auto
end
Example:
Router(config-if)# end
show dot1x
Example:
Router# show dot1x
copy running-config startup-config
Example:
Router# copy running-config startup-config
To disable AAA, use the no aaa new-model global configuration command. To disable 802.1x AAA
authentication, use the no aaa authentication dot1x {default | list-name} method1 [method2...] global
configuration command. To disable 802.1x, use the dot1x port-control force-authorized or the no dot1x port-control interface configuration command.
• For feature interaction information with trunk,
dynamic, dynamic-access, EtherChannel, secure, and
SPAN ports see the “802.1x Configuration Guidelines”
section on page 24.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.
Configuring the Switch-to-RADIUS-Server Communication
RADIUS security servers are identified by their host name or IP address, host name and specific UDP
port numbers, or IP address and specific UDP port numbers. The combination of the IP address and UDP
port number creates a unique identifier, which enables RADIUS requests to be sent to multiple UDP
ports on a server at the same IP address. If two different host entries on the same RADIUS server are
Book Title
26
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
configured for the same service—for example, authentication—the second host entry configured acts as
the fail-over backup to the first one. The RADIUS host entries are tried in the order that they were
configured.
Follow these steps to configure the RADIUS server parameters on the switch. This procedure is required.
Configures the RADIUS server parameters on the switch.
• For hostname | ip-address, specify the host name or IP
address of the remote RADIUS server.
• For auth-portport-number, specify the UDP
destination port for authentication requests. The default
is 1645.
• For keystring, specify the authentication and
encryption key used between the switch and the
RADIUS daemon running on the RADIUS server. The
key is a text string that must match the encryption key
used on the RADIUS server.
NoteAlways configure the key as the last item in the
radius-server host command syntax because
leading spaces are ignored, but spaces within and at
the end of the key are used. If you use spaces in the
key, do not enclose the key in quotation marks
unless the quotation marks are part of the key. This
key must match the encryption used on the
RADIUS daemon.
• If you want to use multiple RADIUS servers, repeat this
command.
Book Title
27
How to Configure EtherSwitch HWICs
Command or ActionPurpose
Step 4
end
Example:
Router(config-if)# end
Step 5
show running-config
Example:
Router# show running-config
Step 6
copy running-config startup-config
Example:
Router# copy running-config startup-config
To delete the specified RADIUS server, use the no radius-server host {hostname | ip-address} global
configuration command.
You can globally configure the timeout, retransmission, and encryption key values for all RADIUS
servers by using the radius-server host global configuration command. If you want to configure these
options on a per-server basis, use the radius-server timeout, radius-server retransmit, and the
radius-server key global configuration commands.
You also need to configure some settings on the RADIUS server. These settings include the IP address
of the switch and the key string to be shared by both the server and the switch. For more information,
refer to the RADIUS server documentation.
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.
Enabling Periodic Reauthentication
You can enable periodic 802.1x client reauthentication and specify how often it occurs. If you do not
specify a time period before enabling reauthentication, the number of seconds between reauthentication
attempts is 3600 seconds.
Automatic 802.1x client reauthentication is a global setting and cannot be set for clients connected to
individual ports.
Follow these steps to enable periodic reauthentication of the client and to configure the number of
seconds between reauthentication attempts.
SUMMARY STEPS
1. enable
2. configure terminal
3. dot1x re-authentication
4. dot1x timeout re-authperiod seconds
5. end
6. show dot1x
7. copy running-config startup-config
28
Book Title
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
DETAILED STEPS
Command or ActionPurpose
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
dot1x re-authentication
Example:
Router(config)# dot1x re-authentication
Step 4
dot1x timeout re-authperiod seconds
Example:
Router(config)# dot1x timeout re-authperiod 120
Step 5
end
How to Configure EtherSwitch HWICs
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters global configuration mode.
Enables periodic reauthentication of the client.
• Periodic reauthentication is disabled by default.
Sets the number of seconds between reauthentication
attempts.
• The range is 1 to 4294967295; the default is 3600
seconds.
• This command affects the behavior of the switch only
if periodic reauthentication is enabled
Returns to privileged EXEC mode.
Example:
Router(config-if)# end
Step 6
show dot1x
Example:
Router# show dot1x
Step 7
copy running-config startup-config
Example:
Router# copy running-config startup-config
To disable periodic reauthentication, use the no dot1x re-authentication global configuration
command. To return to the default number of seconds between reauthentication attempts, use the no dot1x timeout re-authperiod global configuration command.
Changing the Quiet Period
When the switch cannot authenticate the client, the switch remains idle for a set period of time, and then
tries again. The idle time is determined by the quiet-period value. A failed authentication of the client
might occur because the client provided an invalid password. You can provide a faster response time to
the user by entering smaller number than the default.
Follow these steps to change the quiet period.
Verifies your entries.
(Optional) Saves your entries in the configuration file.
Book Title
29
How to Configure EtherSwitch HWICs
SUMMARY STEPS
1. enable
2. configure terminal
3. dot1x timeout quiet-periodseconds
4. end
5. show dot1x
6. copy running-config startup-config
DETAILED STEPS
Command or ActionPurpose
Step 1
enable
Example:
Router> enable
Step 2
configure terminal
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Enables privileged EXEC mode.
• Enter your password if prompted.
Enters global configuration mode.
Step 3
Step 4
Step 5
Step 6
Example:
Router# configure terminal
dot1x timeoutquiet-periodseconds
Example:
Router(config)#dot1x timeout quiet-period 120
end
Example:
Router(config-if)# end
show dot1x
Example:
Router# show dot1x
copy running-config startup-config
Example:
Router# copy running-config startup-config
To return to the default quiet time, use the no dot1x timeout quiet-period global configuration
command.
Sets the number of seconds that the switch remains in the
quiet state following a failed authentication exchange with
the client.
• The range is 0 to 65535 seconds; the default is 60.
Returns to privileged EXEC mode.
Verifies your entries.
(Optional) Saves your entries in the configuration file.
Changing the Switch-to-Client Retransmission Time
The client responds to the EAP-request/identity frame from the switch with an EAP-response/identity
frame. If the switch does not receive this response, it waits a set period of time (known as the
retransmission time), and then retransmits the frame.
Book Title
30
Loading...
+ 88 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.