EasyManua.ls Logo

Cisco 3750G - Catalyst Integrated Wireless LAN Controller - Page 11

Cisco 3750G - Catalyst Integrated Wireless LAN Controller
1204 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
xi
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
Configuring Secure HTTP Servers and Clients 9-44
Default SSL Configuration 9-44
SSL Configuration Guidelines 9-45
Configuring a CA Trustpoint 9-45
Configuring the Secure HTTP Server 9-46
Configuring the Secure HTTP Client 9-47
Displaying Secure HTTP Server and Client Status 9-48
Configuring the Switch for Secure Copy Protocol 9-48
Information About Secure Copy 9-49
CHAPTER
10 Configuring IEEE 802.1x Port-Based Authentication 10-1
Understanding IEEE 802.1x Port-Based Authentication 10-1
Device Roles 10-2
Authentication Process 10-3
Authentication Initiation and Message Exchange 10-5
Ports in Authorized and Unauthorized States 10-7
IEEE 802.1x Authentication and Switch Stacks 10-8
IEEE 802.1x Host Mode 10-8
IEEE 802.1x Accounting 10-9
IEEE 802.1x Accounting Attribute-Value Pairs 10-9
Using IEEE 802.1x Authentication with VLAN Assignment 10-10
Using IEEE 802.1x Authentication with Per-User ACLs 10-11
Using IEEE 802.1x Authentication with Guest VLAN 10-13
Using IEEE 802.1x Authentication with Restricted VLAN 10-14
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 10-15
Using IEEE 802.1x Authentication with Voice VLAN Ports 10-16
Using IEEE 802.1x Authentication with Port Security 10-17
Using IEEE 802.1x Authentication with Wake-on-LAN 10-18
Using IEEE 802.1x Authentication with MAC Authentication Bypass 10-18
Using Network Admission Control Layer 2 IEEE 802.1x Validation 10-19
Using Multidomain Authentication 10-20
Using Web Authentication 10-21
Configuring IEEE 802.1x Authentication 10-21
Default IEEE 802.1x Authentication Configuration 10-22
IEEE 802.1x Authentication Configuration Guidelines 10-23
IEEE 802.1x Authentication 10-23
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass
10-24
MAC Authentication Bypass 10-25

Table of Contents

Related product manuals