Contents
xi
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
Configuring Secure HTTP Servers and Clients 9-44
Default SSL Configuration 9-44
SSL Configuration Guidelines 9-45
Configuring a CA Trustpoint 9-45
Configuring the Secure HTTP Server 9-46
Configuring the Secure HTTP Client 9-47
Displaying Secure HTTP Server and Client Status 9-48
Configuring the Switch for Secure Copy Protocol 9-48
Information About Secure Copy 9-49
CHAPTER
10 Configuring IEEE 802.1x Port-Based Authentication 10-1
Understanding IEEE 802.1x Port-Based Authentication 10-1
Device Roles 10-2
Authentication Process 10-3
Authentication Initiation and Message Exchange 10-5
Ports in Authorized and Unauthorized States 10-7
IEEE 802.1x Authentication and Switch Stacks 10-8
IEEE 802.1x Host Mode 10-8
IEEE 802.1x Accounting 10-9
IEEE 802.1x Accounting Attribute-Value Pairs 10-9
Using IEEE 802.1x Authentication with VLAN Assignment 10-10
Using IEEE 802.1x Authentication with Per-User ACLs 10-11
Using IEEE 802.1x Authentication with Guest VLAN 10-13
Using IEEE 802.1x Authentication with Restricted VLAN 10-14
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 10-15
Using IEEE 802.1x Authentication with Voice VLAN Ports 10-16
Using IEEE 802.1x Authentication with Port Security 10-17
Using IEEE 802.1x Authentication with Wake-on-LAN 10-18
Using IEEE 802.1x Authentication with MAC Authentication Bypass 10-18
Using Network Admission Control Layer 2 IEEE 802.1x Validation 10-19
Using Multidomain Authentication 10-20
Using Web Authentication 10-21
Configuring IEEE 802.1x Authentication 10-21
Default IEEE 802.1x Authentication Configuration 10-22
IEEE 802.1x Authentication Configuration Guidelines 10-23
IEEE 802.1x Authentication 10-23
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass
10-24
MAC Authentication Bypass 10-25