Index
IN-35
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
manual re-authentication of a client 1-49
periodic re-authentication 1-48
quiet period 1-49
RADIUS server 1-47, 1-13
RADIUS server parameters on the switch 1-46,
1-11
restricted VLAN 1-62
switch-to-client frame-retransmission
number
1-50, 1-51
switch-to-client retransmission time 1-50
violation modes 1-43 to 1-44
default configuration 1-38, 1-9
described 1-1
device roles 1-3, 1-2
displaying statistics 1-76, 1-17
downloadable ACLs and redirect URLs
configuring
1-71 to 1-73, ?? to 1-73
overview 1-18 to 1-20
EAPOL-start frame 1-6
EAP-request/identity frame 1-6
EAP-response/identity frame 1-6
enabling
802.1X authentication
1-11
encapsulation 1-3
flexible authentication ordering
configuring
1-74
overview 1-31
guest VLAN
configuration guidelines
1-21, 1-22
described 1-21
host mode 1-12
inaccessible authentication bypass
configuring
1-63
described 1-23
guidelines 1-40
initiation and message exchange 1-6
magic packet 1-28
maximum number of allowed devices per port 1-41
method lists 1-44
multiple authentication 1-12
multiple-hosts mode, described 1-12
per-user ACLs
AAA authorization
1-44
configuration tasks 1-18
described 1-17
RADIUS server attributes 1-17
ports
authorization state and dot1x port-control
command
1-11
authorized and unauthorized 1-10
voice VLAN 1-28
port security
described
1-28
readiness check
configuring
1-41
described 1-15, 1-41
resetting to default values 1-76
stack changes, effects of 1-11
statistics, displaying 1-76
switch
as proxy
1-3, 1-2
RADIUS client 1-3
switch supplicant
configuring
1-69
overview 1-33
user distribution
guidelines
1-27
overview 1-27
VLAN assignment
AAA authorization
1-44
characteristics 1-16
configuration tasks 1-17
described 1-16
voice aware 802.1x security
configuring
1-42
described 1-34, 1-42
voice VLAN
described
1-28