You must provide network connectivity to hosts that fail authentication. In this scenario, what would be used in a network secured with 802.1X to satisfy this requirement?
A.
Configure the native-vlan-id parameter on the port.
B.
Use the server-reject-vlan command to specify a guest VLAN.
C.
Configure a secondary IP address on the port for unauthenticated hosts.
D.
Configure the port as a spanning tree edge port.
For a device configured for 802.1X authentication, specify that when the device receives an Extensible Authentication Protocol Over LAN (EAPoL) Access-Reject message during the authentication process between the device and the RADIUS authentication server, supplicants attempting to access the LAN are granted access and moved to a specific bridge domain or VLAN. Any bridge domain, VLAN name or VLAN ID sent by a RADIUS server as part of the EAPoL Access-Reject message is ignored.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
mohdema
Highly Voted 1 year, 11 months agosomanyquestions
1 year, 1 month agoharrypogi
Most Recent 1 year, 2 months ago