Thanks for your responses. I was trying to use the command as the Software Advisor asks for it after you have pasted in the reponse from a "show ver" command. I reached the conculsion that the IOS did not support the command. Though surely it would not be hard for the SA to reference the IOS version you have pasted in and not ask for commands if the IOS version does not support them!
Searching for "802.1x" gives a list of all those features, select "Wake on LAN support" (for example) and click add, then continue.
The platform box gives a list of all platforms that support the feature, so select 3750.
The lowest feature set is IP Base (you might have something else but worth checking this first as it's the lowest feature set)
This gives a list of about 20 versions of software which support the feature so you can see you need at least 12.2(25)SEC to get this particular feature.
The process is pretty much the same for any feature. If you know the actual command you need (in this case it's "dot1x control-direction" then you could get the same info by just looking it up in the latest command reference as that will also tell you when the feature first appeared.
Finally, if you just want a list of features for a particular release then use the same link and choose search by platform, but be aware this will be a *long* list.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...