filter-strict-security enable

Enables or disables strict filter security for MAC authentication and 802.1X authentication.

Syntax

filter-strict-security
no filter-strict-security

Command Default

Strict filter security is enabled.

Modes

Authentication mode

Usage Guidelines

When strict security mode is enabled, authentication for a port fails if the Filter-Id attribute contains invalid information, or if insufficient system resources are available to implement the IP ACLs.

When strict security mode is enabled:

  • If the Filter-Id attribute in the Access-Accept message contains a value that does not refer to an existing filter (that is, IP ACL configured on the device), then the client will not be authorized, regardless of any other information in the message (for example, if the Tunnel-Private-Group-ID attribute specifies a VLAN on which to assign the port).
  • If the device does not have the system resources available to dynamically apply a filter to a port, then the client will not be authenticated.

When strict filter security is disabled:

  • If the Filter-Id attribute in the Access-Accept message contains a value that does not refer to an existing filter (that is, a MAC address filter or IP ACL configured on the device), then the client remains authorized and no filter is dynamically applied to it.
  • By default, strict security mode is enabled for all MAC authentication and 802.1X-enabled interfaces, but you can manually disable or enable it using the filter-strict-security command from the authentication configuration mode or using the authentication filter-strict-security command from the interface configuration mode.

The no form of the command disables strict filter security.

Examples

The following example enables strict filter security.

device(config)# authentication
device(config-authen)# filter-strict-security enable

History

Release version Command history
08.0.20 This command was introduced.