dot1x filter-strict-security
Enables or disables strict filter security for dot1x authentication on the interface.
Syntax
dot1x filter-strict-security
no dot1x filter-strict-security
Command Default
Strict filter security is enabled.
Modes
Interface configuration mode
Usage Guidelines
By default, strict security mode is enabled; that is the client is not authenticated if the Filter-Id attribute returned by RADIUS contains invalid information, or if insufficient system resources are available to implement the IP ACLs or MAC address filters.
When strict security mode is enabled:
- If the Filter-Id attribute in the Access-Accept message contains a value that does not refer to an existing filter (that is, a MAC address filter or IP ACL configured on the device), then the client will not be authenticated, regardless of any other information in the message (for example, if the Tunnel-Private-Group-ID attribute specifies a VLAN on which to assign the port).
- If the Vendor-Specific attribute specifies the syntax for a filter, but there are insufficient system resources to implement the filter, then the client will not be authenticated.
- If the device does not have the system resources available to dynamically apply a filter to a port, then the client will not be authenticated.
When strict security mode is disabled:
- If the Filter-Id attribute in the Access-Accept message contains a value that does not refer to an existing filter (that is, a MAC address filter or IP ACL configured on the device), then the client is still authenticated, but no filter is dynamically applied to it.
- If the Vendor-Specific attribute specifies the syntax for a filter, but there are insufficient system resources to implement the filter, then the client is still authenticated, but the filter specified in the Vendor-Specific attribute is not applied to the port.
The
no form of the command disables strict filter security.
Examples
The following example enables strict filter security.
device(config)# interface Ethernet 1/1
device(conf-if-eth-1/1)# dot1x filter-strict-security