dot1x filter-strict-security
 
   
   Enables or disables strict filter security for dot1x authentication on the interface. 
  
 Syntax
 
	 dot1x filter-strict-security 
	 
 
	 no dot1x filter-strict-security 
	 
 
	 Command Default
 
		Strict filter security is enabled. 
		
 
	 
 
	 Modes
 
		Interface configuration mode 
		
 
	 
 
	 Usage Guidelines
 
		 By default, strict security mode is enabled; that is the client is not authenticated if the Filter-Id attribute returned by RADIUS contains invalid information, or if insufficient system resources are available to implement the IP ACLs or MAC address filters. 
		
 
		 When strict security mode is enabled: 
		
 
		 
		  -  If the Filter-Id attribute in the Access-Accept message contains a value that does not refer to an existing filter (that is, a MAC address filter or IP ACL configured on the device), then the client will not be authenticated, regardless of any other information in the message (for example, if the Tunnel-Private-Group-ID attribute specifies a VLAN on which to assign the port). 
		  
-  If the Vendor-Specific attribute specifies the syntax for a filter, but there are insufficient system resources to implement the filter, then the client will not be authenticated. 
		  
-  If the device does not have the system resources available to dynamically apply a filter to a port, then the client will not be authenticated. 
		  
 When strict security mode is disabled: 
		
 
		 
		  -  If the Filter-Id attribute in the Access-Accept message contains a value that does not refer to an existing filter (that is, a MAC address filter or IP ACL configured on the device), then the client is still authenticated, but no filter is dynamically applied to it. 
		  
-  If the Vendor-Specific attribute specifies the syntax for a filter, but there are insufficient system resources to implement the filter, then the client is still authenticated, but the filter specified in the Vendor-Specific attribute is not applied to the port. 
		  
The 
		  no form of the command disables strict filter security. 
		
 
	 
Examples
 
	  
		The following example enables strict filter security. 
		
 
		device(config)# interface Ethernet 1/1
device(conf-if-eth-1/1)# dot1x filter-strict-security