Chapter 1
Overview
Standard and extended IP access control lists (ACLs) for defining inbound security policies on
•
Layer 2 interfaces (port ACLs)
•
Extended MAC access control lists for defining security policies in the inbound direction on Layer 2
interfaces
•
Source and destination MAC-based ACLs for filtering non-IP traffic
•
DHCP snooping to filter untrusted DHCP messages between untrusted hosts and DHCP servers
•
IP source guard to restrict traffic on nonrouted interfaces by filtering traffic based on the DHCP
snooping database and IP source bindings
•
Dynamic ARP inspection to prevent malicious attacks on the switch by not relaying invalid ARP
requests and responses to other ports in the same VLAN
IEEE 802.1x port-based authentication to prevent unauthorized devices (clients) from gaining
•
access to the network. These features are supported:
–
Note
–
–
–
Note
–
–
–
–
–
Note
–
–
–
OL-26520-01
Multidomain authentication (MDA) to allow both a data device and a voice device, such as an
IP phone (Cisco or non-Cisco), to independently authenticate on the same IEEE 802.1x-enabled
switch port
To use MDA, the switch must be running the LAN Base image.
Dynamic voice virtual LAN (VLAN) for MDA to allow a dynamic voice VLAN on an
MDA-enabled port
VLAN assignment for restricting 802.1x-authenticated users to a specified VLAN
Support for VLAN assignment on a port configured for multi-auth mode. The RADIUS server
assigns a VLAN to the first host to authenticate on the port, and subsequent hosts use the same
VLAN. Voice VLAN assignment is supported for one IP phone.
To use this feature, the switch must be running the LAN Base image.
Port security for controlling access to 802.1x ports
Voice VLAN to permit a Cisco IP Phone to access the voice VLAN regardless of the authorized
or unauthorized state of the port
IP phone detection enhancement to detect and recognize a Cisco IP phone.
Guest VLAN to provide limited services to non-802.1x-compliant users
Restricted VLAN to provide limited services to users who are 802.1x compliant, but do not have
the credentials to authenticate via the standard 802.1x processes
To use authentication with restricted VLANs, the switch must be running the LAN Base
image.
802.1x accounting to track network usage
802.1x with wake-on-LAN to allow dormant PCs to be powered on based on the receipt of a
specific Ethernet frame
802.1x readiness check to determine the readiness of connected end hosts before configuring
IEEE 802.1x on the switch
Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE
Features
1-11