Overview
Some deployments allow the authentication bypass of VoIP phones to help with emergency scenarios to prevent delaying of authentication due to RADIUS outage. The following sections detail how VoIP devices can be configured to be bypassed by identifying their CDP or LLDP signatures.
Creation of device-identity: device-identity command has protocol type and values required for configuring bypass.
- Creation of device profile: A profile is a named collection of port settings applied as a group.
Mode is introduced in device profile to specify that the device is connected as an infrastructure device or a multi host supported device.
switch(config)#device profile name mode Specify the type of port mode for device profile switch(config)#device profile name mode client-mode Configure the device connected port as client mode Port-mode Configure the device connected port as Port mode
For device profile and device-identity configurations, see Management and Configuration Guide of your switch.
Devices that do not match the requisite profile are subjected to full authentication as configured on the switch.