hit counter script

Cisco Catalyst 3560-X Software Configuration Manual page 290

Hide thumbs Also See for Catalyst 3560-X:
Table of Contents

Advertisement

Understanding IEEE 802.1x Port-Based Authentication
Until the client is authenticated, 802.1x access control allows only Extensible Authentication Protocol
over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through
the port to which the client is connected. After authentication is successful, normal traffic can pass
through the port.
Device Roles, page 1-3
Authentication Process, page 1-4
Authentication Initiation and Message Exchange, page 1-6
Authentication Manager, page 1-7
Ports in Authorized and Unauthorized States, page 1-10
802.1x Authentication and Switch Stacks, page 1-11
802.1x Host Mode, page 1-12
MAC Move, page 1-13
MAC Replace, page 1-14
802.1x Accounting, page 1-14
802.1x Accounting Attribute-Value Pairs, page 1-14
802.1x Multiple Authentication Mode, page 1-12
802.1x Readiness Check, page 1-15
802.1x Authentication with Per-User ACLs, page 1-17
802.1x Authentication with Guest VLAN, page 1-21
802.1x Authentication with Restricted VLAN, page 1-22
802.1x Authentication with Inaccessible Authentication Bypass, page 1-23
802.1x Critical Voice VLAN Configuration, page 1-24
802.1x Authentication with Downloadable ACLs and Redirect URLs, page 1-18
VLAN ID-based MAC Authentication, page 1-20
IEEE 802.1x Authentication with Voice VLAN Ports, page 1-28
IEEE 802.1x Authentication with Port Security, page 1-28
IEEE 802.1x Authentication with Wake-on-LAN, page 1-28
IEEE 802.1x Authentication with MAC Authentication Bypass, page 1-29
802.1x User Distribution, page 1-27
Network Admission Control Layer 2 IEEE 802.1x Validation, page 1-30
Multidomain Authentication, page 1-31
Flexible Authentication Ordering, page 1-31
Open1x Authentication, page 1-31
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT),
page 1-33
Voice Aware 802.1x Security, page 1-34
Common Session ID, page 1-35
Device Sensor, page 1-35
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
1-2
Chapter 1
Configuring IEEE 802.1x Port-Based Authentication
OL-25303-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3750-x

Table of Contents