Chapter 18: 802.1x Port-based Network Access
226
This authentication method does not require 802.1x client software
on client nodes.
Re-Auth Learning— Select the checkbox to force the port that is
using MAC address authentication into the unauthorized state. You
may use this setting to reauthenticate the nodes on the
authenticator port.
6. Click Apply.
7. Click SAVE
to save your changes to the startup configuration file.